Alerts

Alerts allow you to configure automated webhook notifications for important events in your Opik workspace. When specific events occur — such as trace errors, new feedback scores, or prompt changes — Opik sends HTTP POST requests to your configured endpoint with detailed event data.

Opik provides three destination types for alerts:

  • Slack: Native integration with automatic message formatting for Slack
  • PagerDuty: Native integration with automatic event formatting for PagerDuty
  • General: For custom webhooks, no-code automation platforms, or middleware services
Alerts configuration in Opik

Creating an alert

Prerequisites

  • Access to the Opik Configuration page
  • A webhook endpoint that can receive HTTP POST requests
  • (Optional) An HTTPS endpoint with valid SSL certificate for production use

Step-by-step guide

Create alert form
  1. Navigate to Alerts

    • Go to Configuration → Alerts tab
    • Click “Create new alert” button
  2. Configure basic settings

    • Name: Give your alert a descriptive name (e.g., “Production Errors Slack”)
    • Enable alert: Toggle on to activate the alert immediately
  3. Configure webhook settings

    • Destination: Select the alert destination type:
      • General: For custom webhooks, no-code automation platforms, or middleware services
      • Slack: For native Slack webhook integration (automatically formats messages for Slack)
      • PagerDuty: For native PagerDuty integration (automatically formats events for PagerDuty)
    • Endpoint URL: Enter your webhook URL (must start with http:// or https://)
      • For Slack: Use your Slack Incoming Webhook URL (e.g., https://hooks.slack.com/services/...)
      • For PagerDuty: Use your PagerDuty Events API v2 integration URL (e.g., https://events.pagerduty.com/v2/enqueue)
      • For General: Use any HTTP endpoint that can receive POST requests
  4. Advanced webhook settings (optional)

    • Secret token: Add a secret token to verify webhook authenticity (recommended for General destination)
    • Custom headers: Add HTTP headers for authentication or routing
      • Example: X-Custom-Auth: Bearer your-token-here
  5. Add triggers

    • Click “Add trigger” to select event types
    • Choose one or more event types from the list
    • Configure project scope for observability events (optional)
    • For threshold-based alerts (errors, cost, latency, feedback scores):
      • Threshold: Set the threshold value that triggers the alert
      • Operator: Choose comparison operator (>, <) for feedback score alerts
      • Window: Configure the time window in seconds for metric aggregation
      • Feedback Score Name: Select which feedback score to monitor (for feedback score alerts only)
  6. Test your configuration

    • Click “Test connection” to send a sample webhook
    • Verify your endpoint receives the test payload
    • Check the response status in the Opik UI
  7. Create the alert

    • Click “Create alert” to save your configuration
    • The alert will start monitoring events immediately

Integration examples

Opik supports three main approaches for integrating alerts with external systems:

  1. Native integrations (Slack, PagerDuty): Use built-in formatting for popular services - no middleware required
  2. General webhooks: Send alerts to custom endpoints, no-code platforms, or middleware services
  3. Middleware services (Optional): Add custom logic, routing, or transformations before forwarding to destinations

Slack integration (Native)

Opik provides native Slack integration that automatically formats alert messages for Slack’s Block Kit format.

Prerequisites

Setup steps

  1. In Slack:

    • Create a Slack app in your workspace
    • Enable Incoming Webhooks
    • Add the webhook to your desired channel
    • Copy the webhook URL
  2. In Opik:

    • Go to Configuration → Alerts tab
    • Click “Create new alert”
    • Give your alert a descriptive name
    • Select Slack as the destination type
    • Paste your Slack webhook URL in the Endpoint URL field
    • Add triggers for the events you want to monitor
    • Click “Test connection” to verify
    • Click “Create alert”

Opik will automatically format all alert payloads into Slack-compatible messages with rich formatting, including:

  • Alert name and event type
  • Event count and details
  • Relevant metadata
  • Links to view full details in Opik

PagerDuty integration (Native)

Opik provides native PagerDuty integration that automatically formats alert events for PagerDuty’s Events API v2.

Prerequisites

  • A PagerDuty account with permission to create integrations
  • Access to a service where you want to receive alerts

Setup steps

  1. In PagerDuty:

    • Navigate to Services → select your service → Integrations tab
    • Click “Add Integration”
    • Select “Events API V2”
    • Give the integration a name (e.g., “Opik Alerts”)
    • Save the integration and copy the Integration Key
  2. In Opik:

    • Go to Configuration → Alerts tab
    • Click “Create new alert”
    • Give your alert a descriptive name
    • Select PagerDuty as the destination type
    • Enter the PagerDuty Events API v2 endpoint: https://events.pagerduty.com/v2/enqueue
    • In the Routing Key field, enter your PagerDuty Integration Key (this field appears when PagerDuty is selected as the destination)
    • Add triggers for the events you want to monitor
    • Click “Test connection” to verify
    • Click “Create alert”

Opik will automatically format all alert payloads into PagerDuty-compatible events with:

  • Severity levels based on event type
  • Detailed event information
  • Custom fields for filtering and routing
  • Deduplication keys to prevent duplicate incidents

Custom integration with middleware service (Optional)

For more complex integrations or custom formatting requirements, you can use a middleware service to transform Opik’s payload before sending it to your destination. This approach works with any destination type (General, Slack, or PagerDuty).

When to use middleware

  • Custom message formatting: Transform payload structure or add custom fields
  • Multi-destination routing: Send alerts to different endpoints based on event type
  • Additional processing: Enrich alerts with data from other systems
  • Legacy systems: Adapt Opik alerts to older webhook formats

Example middleware for Slack with custom formatting

1import requests
2
3def transform_to_slack(opik_payload):
4 event_type = opik_payload.get('eventType')
5 alert_name = opik_payload['payload']['alertName']
6 event_count = opik_payload['payload']['eventCount']
7
8 # Custom formatting logic
9 return {
10 "blocks": [
11 {
12 "type": "header",
13 "text": {
14 "type": "plain_text",
15 "text": f"🚨 {alert_name}"
16 }
17 },
18 {
19 "type": "section",
20 "text": {
21 "type": "mrkdwn",
22 "text": f"*{event_count}* new `{event_type}` events"
23 }
24 },
25 {
26 "type": "section",
27 "text": {
28 "type": "mrkdwn",
29 "text": f"View in Opik: https://www.comet.com/opik"
30 }
31 },
32 {
33 "type": "section",
34 "fields": [
35 {
36 "type": "mrkdwn",
37 "text": f"*Environment:*\nProduction"
38 },
39 {
40 "type": "mrkdwn",
41 "text": f"*Priority:*\nHigh"
42 }
43 ]
44 }
45 ]
46 }
47
48@app.route('/opik-to-slack', methods=['POST'])
49def opik_to_slack():
50 opik_data = request.json
51 slack_payload = transform_to_slack(opik_data)
52
53 # Forward to Slack
54 requests.post(
55 SLACK_WEBHOOK_URL,
56 json=slack_payload
57 )
58
59 return {'status': 'success'}, 200

Setup for middleware approach

  1. Deploy your middleware service to a publicly accessible endpoint
  2. In Opik, create an alert with destination type General
  3. Use your middleware service URL as the Endpoint URL
  4. Configure your middleware to forward to the final destination (Slack, PagerDuty, etc.)

Using no-code automation platforms

No-code automation tools like n8n, Make.com, and IFTTT provide an easy way to connect Opik alerts to other services—without writing or deploying code. These platforms can receive webhooks from Opik, apply filters or conditions, and trigger actions such as sending Slack messages, logging data in Google Sheets, or creating incidents in PagerDuty.

No-code automation flow example

To use them:

  1. Create a new workflow or scenario and add a Webhook trigger node/module
  2. Copy the webhook URL generated by the platform
  3. In Opik, create an alert with destination type General and paste the webhook URL from your automation platform
  4. Secure the connection by validating the Authorization header or including a secret token parameter
  5. Add filters or routing logic to handle different eventType values from Opik (for example, trace:errors or trace:feedback_score)
  6. Chain the desired actions, such as notifications, database updates, or analytics tracking

These tools also provide built-in monitoring, retries, and visual flow editors, making them suitable for both technical and non-technical users who want to automate Opik alert handling securely and efficiently. This approach works well when you need to route alerts to multiple destinations or apply complex business logic.

Custom dashboard integration

Build a custom monitoring dashboard that receives alerts using the General destination type:

1from fastapi import FastAPI, Request
2from datetime import datetime
3
4app = FastAPI()
5
6# In-memory storage (use a database in production)
7alert_history = []
8
9@app.post("/webhook")
10async def receive_webhook(request: Request):
11 data = await request.json()
12
13 # Store alert
14 alert_history.append({
15 'timestamp': datetime.utcnow(),
16 'event_type': data.get('eventType'),
17 'alert_name': data['payload']['alertName'],
18 'event_count': data['payload']['eventCount'],
19 'data': data
20 })
21
22 # Keep only last 1000 alerts
23 if len(alert_history) > 1000:
24 alert_history.pop(0)
25
26 return {"status": "success"}
27
28@app.get("/dashboard")
29async def get_dashboard():
30 # Return aggregated statistics
31 return {
32 'total_alerts': len(alert_history),
33 'by_type': group_by_type(alert_history),
34 'recent_alerts': alert_history[-10:]
35 }

Supported event types

Opik supports ten types of alert events:

Observability events

Trace errors threshold exceeded

  • Event type: trace:errors
  • Triggered when: Total trace error count exceeds the specified threshold within a time window
  • Project scope: Can be configured to specific projects
  • Configuration: Requires threshold value (error count) and time window (in seconds)
  • Payload: Metrics alert payload with error count details
  • Use case: Proactive error monitoring, detect error spikes, prevent system degradation

Trace feedback score threshold exceeded

  • Event type: trace:feedback_score
  • Triggered when: Average trace feedback score meets the specified threshold criteria within a time window
  • Project scope: Can be configured to specific projects
  • Configuration: Requires feedback score name, threshold value, operator (>, <), and time window
  • Payload: Metrics alert payload with average feedback score details
  • Use case: Track model performance, monitor user satisfaction, detect quality degradation

Thread feedback score threshold exceeded

  • Event type: trace_thread:feedback_score
  • Triggered when: Average thread feedback score meets the specified threshold criteria within a time window
  • Project scope: Can be configured to specific projects
  • Configuration: Requires feedback score name, threshold value, operator (>, <), and time window
  • Payload: Metrics alert payload with average feedback score details
  • Use case: Monitor conversation quality, track multi-turn interactions, detect thread satisfaction issues

Guardrails triggered

  • Event type: trace:guardrails_triggered
  • Triggered when: A guardrail check fails for a trace
  • Project scope: Can be configured to specific projects
  • Payload: Array of guardrail result objects
  • Use case: Security monitoring, compliance tracking, PII detection

Cost threshold exceeded

  • Event type: trace:cost
  • Triggered when: Total trace cost exceeds the specified threshold within a time window
  • Project scope: Can be configured to specific projects
  • Configuration: Requires threshold value (in currency units) and time window (in seconds)
  • Payload: Metrics alert payload with cost details
  • Use case: Budget monitoring, cost control, prevent runaway spending

Latency threshold exceeded

  • Event type: trace:latency
  • Triggered when: Average trace latency exceeds the specified threshold within a time window
  • Project scope: Can be configured to specific projects
  • Configuration: Requires threshold value (in seconds) and time window (in seconds)
  • Payload: Metrics alert payload with latency details
  • Use case: Performance monitoring, SLA compliance, user experience tracking

Prompt engineering events

New prompt added

  • Event type: prompt:created
  • Triggered when: A new prompt is created in the prompt library
  • Project scope: Workspace-wide
  • Payload: Prompt object with metadata
  • Use case: Track prompt library changes, audit prompt creation

New prompt version created

  • Event type: prompt:committed
  • Triggered when: A new version (commit) is added to a prompt
  • Project scope: Workspace-wide
  • Payload: Prompt version object with template and metadata
  • Use case: Monitor prompt iterations, track version history

Prompt deleted

  • Event type: prompt:deleted
  • Triggered when: A prompt is removed from the prompt library
  • Project scope: Workspace-wide
  • Payload: Array of deleted prompt objects
  • Use case: Audit prompt deletions, maintain prompt governance

Evaluation events

Experiment finished

  • Event type: experiment:finished
  • Triggered when: An experiment completes in the workspace
  • Project scope: Workspace-wide
  • Payload: Array of experiment objects with completion details
  • Use case: Automate experiment notifications, track evaluation completions

Want us to support more event types?

If you need additional event types for your use case, please create an issue on GitHub and let us know what you’d like to monitor.

Webhook payload structure

All webhook events follow a consistent payload structure:

1{
2 "id": "webhook-event-id",
3 "eventType": "trace:errors",
4 "alertId": "alert-uuid",
5 "alertName": "Production Errors Alert",
6 "workspaceId": "workspace-uuid",
7 "createdAt": "2025-01-15T10:30:00Z",
8 "payload": {
9 "alertId": "alert-uuid",
10 "alertName": "Production Errors Alert",
11 "eventType": "trace:errors",
12 "eventIds": ["event-id-1", "event-id-2"],
13 "userNames": ["user@example.com"],
14 "eventCount": 2,
15 "aggregationType": "consolidated",
16 "message": "Alert 'Production Errors Alert': 2 trace:errors events aggregated",
17 "metadata": [
18 {
19 "id": "trace-uuid",
20 "name": "handle_query",
21 "project_id": "project-uuid",
22 "project_name": "Demo Project",
23 "start_time": "2025-01-15T10:29:45Z",
24 "end_time": "2025-01-15T10:29:50Z",
25 "input": {
26 "query": "User question"
27 },
28 "output": {
29 "response": "LLM response"
30 },
31 "error_info": {
32 "exception_type": "ValidationException",
33 "message": "Validation failed",
34 "traceback": "Full traceback..."
35 },
36 "metadata": {
37 "customer_id": "customer_123"
38 },
39 "tags": ["production"]
40 }
41 ]
42 }
43}

Payload fields

FieldTypeDescription
idstringUnique webhook event identifier
eventTypestringType of event (e.g., trace:errors)
alertIdstring (UUID)Alert configuration identifier
alertNamestringName of the alert
workspaceIdstringWorkspace identifier
createdAtstring (ISO 8601)Timestamp when webhook was created
payload.eventIdsarrayList of aggregated event IDs
payload.userNamesarrayUsers associated with the events
payload.eventCountnumberNumber of aggregated events
payload.aggregationTypestringAlways “consolidated”
payload.metadataarrayEvent-specific data (varies by event type)

Event-specific payloads

Trace errors threshold exceeded payload

1{
2 "metadata": {
3 "event_type": "TRACE_ERRORS",
4 "metric_name": "trace:errors",
5 "metric_value": "15",
6 "threshold": "10",
7 "window_seconds": "900",
8 "project_ids": "0198ec68-6e06-7253-a20b-d35c9252b9ba,0198ec68-6e06-7253-a20b-d35c9252b9bb",
9 "project_names": "Demo Project,Default Project"
10 }
11}

Trace feedback score threshold exceeded payload

1{
2 "metadata": {
3 "event_type": "TRACE_FEEDBACK_SCORE",
4 "metric_name": "trace:feedback_score",
5 "metric_value": "0.7500",
6 "threshold": "0.8000",
7 "window_seconds": "3600",
8 "project_ids": "0198ec68-6e06-7253-a20b-d35c9252b9ba,0198ec68-6e06-7253-a20b-d35c9252b9bb",
9 "project_names": "Demo Project,Default Project"
10 }
11}

Thread feedback score threshold exceeded payload

1{
2 "metadata": {
3 "event_type": "TRACE_THREAD_FEEDBACK_SCORE",
4 "metric_name": "trace_thread:feedback_score",
5 "metric_value": "0.7500",
6 "threshold": "0.8000",
7 "window_seconds": "3600",
8 "project_ids": "0198ec68-6e06-7253-a20b-d35c9252b9ba,0198ec68-6e06-7253-a20b-d35c9252b9bb",
9 "project_names": "Demo Project,Default Project"
10 }
11}

Prompt created payload

1{
2 "metadata": {
3 "id": "prompt-uuid",
4 "name": "Prompt Name",
5 "description": "Prompt description",
6 "tags": ["system", "assistant"],
7 "created_at": "2025-01-15T10:00:00Z",
8 "created_by": "user@example.com",
9 "last_updated_at": "2025-01-15T10:00:00Z",
10 "last_updated_by": "user@example.com"
11 }
12}

Prompt version created payload

1{
2 "metadata": {
3 "id": "version-uuid",
4 "prompt_id": "prompt-uuid",
5 "commit": "abc12345",
6 "template": "You are a helpful assistant. {{question}}",
7 "type": "mustache",
8 "metadata": {
9 "version": "1.0",
10 "model": "gpt-4"
11 },
12 "created_at": "2025-01-15T10:00:00Z",
13 "created_by": "user@example.com"
14 }
15}

Prompt deleted payload

1{
2 "metadata": [
3 {
4 "id": "prompt-uuid",
5 "name": "Prompt Name",
6 "description": "Prompt description",
7 "tags": ["deprecated"],
8 "created_at": "2025-01-10T10:00:00Z",
9 "created_by": "user@example.com",
10 "last_updated_at": "2025-01-15T10:00:00Z",
11 "last_updated_by": "user@example.com",
12 "latest_version": {
13 "id": "version-uuid",
14 "commit": "abc12345",
15 "template": "Template content",
16 "type": "mustache",
17 "created_at": "2025-01-15T10:00:00Z",
18 "created_by": "user@example.com"
19 }
20 }
21 ]
22}

Guardrails triggered payload

1{
2 "metadata": [
3 {
4 "id": "guardrail-check-uuid",
5 "entity_id": "trace-uuid",
6 "project_id": "project-uuid",
7 "project_name": "Project Name",
8 "name": "PII",
9 "result": "failed",
10 "details": {
11 "detected_entities": ["EMAIL", "PHONE_NUMBER"],
12 "message": "PII detected in response: email and phone number"
13 }
14 }
15 ]
16}

Experiment finished payload

1{
2 "metadata": [
3 {
4 "id": "experiment-uuid",
5 "name": "Experiment Name",
6 "dataset_id": "dataset-uuid",
7 "created_at": "2025-01-15T10:00:00Z",
8 "created_by": "user@example.com",
9 "last_updated_at": "2025-01-15T10:05:00Z",
10 "last_updated_by": "user@example.com",
11 "feedback_scores": [
12 {
13 "name": "accuracy",
14 "value": 0.92
15 },
16 {
17 "name": "latency",
18 "value": 1.5
19 }
20 ]
21 }
22 ]
23}

Cost threshold exceeded payload

1{
2 "metadata": {
3 "event_type": "TRACE_COST",
4 "metric_name": "trace:cost",
5 "metric_value": "150.75",
6 "threshold": "100.00",
7 "window_seconds": "3600",
8 "project_ids": "0198ec68-6e06-7253-a20b-d35c9252b9ba,0198ec68-6e06-7253-a20b-d35c9252b9bb",
9 "project_names": "Demo Project,Default Project"
10 }
11}

Latency threshold exceeded payload

1{
2 "metadata": {
3 "event_type": "TRACE_LATENCY",
4 "metric_name": "trace:latency",
5 "metric_value": "5250.5000",
6 "threshold": "5",
7 "window_seconds": "1800",
8 "project_ids": "0198ec68-6e06-7253-a20b-d35c9252b9ba,0198ec68-6e06-7253-a20b-d35c9252b9bb",
9 "project_names": "Demo Project,Default Project"
10 }
11}

Securing your webhooks

Using secret tokens

Add a secret token to your webhook configuration to verify that incoming requests are from Opik:

  1. Generate a secure random token (e.g., using openssl rand -hex 32)
  2. Add it to your alert’s “Secret token” field
  3. Opik will send it in the Authorization header: Authorization: Bearer your-secret-token
  4. Validate the token in your webhook handler before processing the request

Example validation (Python/Flask)

1from flask import Flask, request, abort
2import hmac
3
4app = Flask(__name__)
5SECRET_TOKEN = "your-secret-token-here"
6
7@app.route('/webhook', methods=['POST'])
8def handle_webhook():
9 # Verify the secret token
10 auth_header = request.headers.get('Authorization', '')
11 if not auth_header.startswith('Bearer '):
12 abort(401, 'Missing or invalid Authorization header')
13
14 token = auth_header.split(' ', 1)[1]
15 if not hmac.compare_digest(token, SECRET_TOKEN):
16 abort(401, 'Invalid secret token')
17
18 # Process the webhook
19 data = request.json
20 event_type = data.get('eventType')
21
22 # Handle different event types
23 if event_type == 'trace:errors':
24 handle_trace_errors(data)
25 elif event_type == 'trace:feedback_score':
26 handle_feedback_score(data)
27 elif event_type == 'experiment:finished':
28 handle_experiment_finished(data)
29
30 return {'status': 'success'}, 200

Using custom headers

You can add custom headers for additional authentication or routing:

1# In your webhook handler
2api_key = request.headers.get('X-API-Key')
3environment = request.headers.get('X-Environment')
4
5if api_key != EXPECTED_API_KEY:
6 abort(401, 'Invalid API key')
7
8# Route to different handlers based on environment
9if environment == 'production':
10 handle_production_webhook(data)
11else:
12 handle_staging_webhook(data)

Troubleshooting

Webhooks not being delivered

Check endpoint accessibility:

  • Ensure your endpoint is publicly accessible (if using cloud)
  • Verify firewall rules allow incoming connections
  • Test your endpoint with curl: curl -X POST -H "Content-Type: application/json" -d '{"test": "data"}' https://your-endpoint.com/webhook

Check webhook configuration:

  • Verify the URL starts with http:// or https://
  • Check that the endpoint returns 2xx status codes
  • Review custom headers for syntax errors

Check alert status:

  • Ensure the alert is enabled
  • Verify at least one trigger is configured
  • Check that project scope matches your events (for observability events)

Webhook timeouts

Opik expects webhooks to respond within the configured timeout (typically 30 seconds). If your endpoint takes longer:

Optimize your handler:

  • Return a 200 response immediately
  • Process the webhook asynchronously in the background
  • Use a queue system (e.g., Celery, RabbitMQ) for long-running tasks

Example async processing:

1from flask import Flask
2from threading import Thread
3
4app = Flask(__name__)
5
6def process_webhook_async(data):
7 # Long-running processing
8 send_to_slack(data)
9 update_dashboard(data)
10 log_to_database(data)
11
12@app.route('/webhook', methods=['POST'])
13def handle_webhook():
14 data = request.json
15
16 # Start background processing
17 thread = Thread(target=process_webhook_async, args=(data,))
18 thread.start()
19
20 # Return immediately
21 return {'status': 'accepted'}, 200

Duplicate webhooks

If you receive duplicate webhooks:

Check retry configuration:

  • Opik retries failed webhooks with exponential backoff
  • Ensure your endpoint returns 2xx status codes on success
  • Implement idempotency using the webhook id field

Example idempotent handler:

1processed_webhook_ids = set()
2
3@app.route('/webhook', methods=['POST'])
4def handle_webhook():
5 data = request.json
6 webhook_id = data.get('id')
7
8 # Skip if already processed
9 if webhook_id in processed_webhook_ids:
10 return {'status': 'already_processed'}, 200
11
12 # Process webhook
13 process_alert(data)
14
15 # Mark as processed
16 processed_webhook_ids.add(webhook_id)
17
18 return {'status': 'success'}, 200

Events not triggering alerts

Check event type matching:

  • Verify the alert has a trigger for this event type
  • For observability events, check project scope configuration
  • Review project IDs in trigger configuration

Check workspace context:

  • Ensure events are logged to the correct workspace
  • Verify the alert is in the same workspace as your events

Check alert evaluation:

  • View backend logs for alert evaluation messages
  • Confirm events are being published to the event bus
  • Check Redis for alert buckets (self-hosted deployments)

SSL certificate errors

If you see SSL certificate errors in logs:

For development/testing:

  • Use self-signed certificates with proper configuration
  • Or use HTTP endpoints (not recommended for production)

For production:

  • Use valid SSL certificates from trusted CAs
  • Ensure certificate chain is complete
  • Check certificate expiry dates
  • Use services like Let’s Encrypt for free SSL

Architecture and internals

Understanding Opik’s alert architecture can help with troubleshooting and optimization.

How alerts work

The Opik Alerts system monitors your workspace for specific events and sends consolidated webhook notifications to your configured endpoints. Here’s the flow:

  1. Event occurs: An event happens in your workspace (e.g., a trace error, prompt creation, guardrail trigger, new feedback score)
  2. Alert evaluation: The system checks if any enabled alerts match this event type and evaluates threshold conditions (for metrics-based alerts like errors, cost, latency, and feedback scores)
  3. Event aggregation: Multiple events are aggregated over a short time window (debouncing)
  4. Webhook delivery: A consolidated HTTP POST request is sent to your webhook URL
  5. Retry handling: Failed requests are automatically retried with exponential backoff

Event debouncing

To prevent overwhelming your webhook endpoint, Opik aggregates multiple events of the same type within a short time window (typically 30-60 seconds) and sends them as a single consolidated webhook. This is particularly useful for high-frequency events like feedback scores.

Event flow

1. Event occurs (e.g., trace error logged)
2. Service publishes AlertEvent to EventBus
3. AlertEventListener receives event
4. AlertEventEvaluationService evaluates against configured alerts
5. Matching events added to AlertBucketService (Redis)
6. AlertJob (runs every 5 seconds) processes ready buckets
7. WebhookPublisher publishes to Redis stream
8. WebhookSubscriber consumes from stream
9. WebhookHttpClient sends HTTP POST request
10. Retries on failure with exponential backoff

Debouncing mechanism

Opik uses Redis-based buckets to aggregate events:

  • Bucket key format: alert_bucket:{alertId}:{eventType}
  • Window size: Configurable (default 30-60 seconds)
  • Index: Redis Sorted Set for efficient bucket retrieval
  • TTL: Buckets expire automatically after processing

This prevents overwhelming your webhook endpoint with individual events and reduces costs for high-frequency events.

Retry strategy

Failed webhooks are automatically retried:

  • Max retries: Configurable (default 3)
  • Initial delay: 1 second
  • Max delay: 60 seconds
  • Backoff: Exponential with jitter
  • Retryable errors: 5xx status codes, network errors
  • Non-retryable errors: 4xx status codes (except 429)

Best practices

Alert design

Create focused alerts:

  • Use separate alerts for different purposes (e.g., one for errors, one for feedback)
  • Configure project scope to avoid noise from test projects
  • Use descriptive names that explain the alert’s purpose

Optimize for your workflow:

  • Send critical errors to PagerDuty or on-call systems
  • Route feedback scores to analytics platforms
  • Send prompt changes to audit logs or Slack channels

Test thoroughly:

  • Use the “Test connection” feature before enabling alerts
  • Monitor webhook delivery in your endpoint logs
  • Start with a small project scope and expand gradually

Webhook endpoint design

Handle failures gracefully:

  • Return 2xx status codes immediately
  • Process webhooks asynchronously
  • Implement retry logic in your handler
  • Use dead letter queues for permanent failures

Implement security:

  • Always validate secret tokens
  • Use HTTPS endpoints with valid certificates
  • Implement rate limiting to prevent abuse
  • Log all webhook attempts for auditing

Monitor performance:

  • Track webhook processing time
  • Alert on handler failures
  • Monitor queue lengths for async processing
  • Set up dead letter queue monitoring

Scaling considerations

For high-volume workspaces:

  • Use event debouncing (built-in)
  • Implement batch processing in your handler
  • Use message queues for async processing
  • Consider using serverless functions (AWS Lambda, Cloud Functions)

For multiple projects:

  • Create project-specific alerts with scope configuration
  • Use custom headers to route to different handlers
  • Implement filtering in your webhook handler
  • Consider separate endpoints for different event types

Next steps