logoalt Hacker News

nishantjani10today at 9:02 AM0 repliesview on HN

This! Again, like all things in engineering, requires systematic approach of having distributed traces chart out your upstream and downstream dependencies.

you then carve out essential user flows from these system diagrams and only then, why you look at an alert in isolation can you tie the entire story, whether is this alert important, which user workflow does it break, what is the SLO on it.