New AI Incident Response, Multi-Region Agents, and Custom-Domain Status Pages — May 2026
Services Pricing Dashboard

Know before your users do

ServiceAlert.ai watches 2,321+ cloud services, catches outages before the status page updates, and alerts your team through 7 channels including browser push notifications. AI-powered incident summaries, SLA compliance tracking, and trend analytics, plus uptime monitoring for your own infrastructure.

View Live Dashboard
2,321+ Services tracked
5 min Poll interval
4 Signal sources
7 Alert channels
7 Monitor types

From detection to alert in minutes

Every 5 minutes, we check status pages, user reports, and social signals. When something changes, alerts fire instantly.

We poll status pages

StatusPage.io APIs, RSS feeds, health endpoints, and PagerDuty pages for 2,321+ providers.

We watch for signals

User reports, Reddit threads, and Hacker News posts often surface issues 10-30 minutes early.

We detect changes

Status transitions are tracked per-component. New incidents, degradations, and recoveries are captured.

We alert your team

Email, Slack, Teams, Google Chat, Discord, or webhook. Filtered by severity. No noise.

One dashboard for every dependency

Stop checking 20 status pages. See all your cloud providers, identity tools, and SaaS platforms in one view.

  • AWS, Azure, GCP, and 2,321+ more services
  • Identity & security: Okta, CrowdStrike, Zscaler, Duo, SentinelOne
  • Filter by category, status, or search by name
  • Component-level detail for each provider
AWS Operational 2m ago
Okta Major Outage 1m ago
GitHub Operational 3m ago
Cloudflare Degraded 4m ago
Slack Operational 2m ago
Azure AD Operational 1m ago

Catch outages before the status page

Status pages lag by minutes or hours. We combine user reports, Reddit, and Hacker News to surface problems early.

  • User report spikes flag issues before providers acknowledge them
  • Reddit and Hacker News mentions tracked per service
  • Report spikes and official status shown side by side
  • Early Signals alerts notify you on all 7 channels
Okta, Live Activity
2:41 PM Reports 12 user reports in 10 minutes
2:47 PM Reddit "Is Okta down?" thread trending in r/sysadmin
2:52 PM Reports 38 user reports in 15 minutes
3:14 PM Official Okta status page updated to "Degraded"

9 channels, zero noise

Pick the channels that fit your team. Filter by severity. Set cooldowns to prevent alert fatigue. Every alert includes the service name, affected components, severity, and an AI-generated plain-English summary, so your team has context before they even open the dashboard. Slack alerts include interactive Acknowledge / Snooze buttons. PagerDuty and Opsgenie integrations push into your existing on-call routing.

Email
Real-time alerts with full incident context
Slack
Interactive: Acknowledge / Snooze inline from the message
PagerDuty
Push into your incident pipeline via Events API v2
Opsgenie
Route to on-call schedules with US/EU region support
Microsoft Teams
Route to Teams channels via Graph API
Google Chat
Send alerts to spaces via webhook
Discord
Post to Discord channels via webhook
Webhooks
POST JSON to PagerDuty, Zapier, or any endpoint
Browser Push
Instant notifications even when the tab is closed

Slack-native AI SRE agent

A real teammate in your incident channel. Mention @servicealert investigate when an alert fires and within seconds the agent posts a threaded investigation. Confidence-ranked root-cause hypotheses, the actual log lines that triggered the call, the most-recent deploy that touched the affected service, related declared incidents in the last 14 days, and a one-click code-pointer link to the suspect file in your GitHub repo.

  • Hypotheses ranked by confidence, calibrated weekly against past incident outcomes
  • Reactions act as actions: thumbs-up promotes the leading hypothesis, an X silences a flapping monitor with a stated reason, a siren promotes the alert to a full declared incident
  • Pulls log snippets, deploy timeline, and similar past incidents automatically
  • Code-pointer links open the suspect file in your GitHub repo at the right line
  • Not a chatbot — a callable agent every authed user in your workspace can invoke
@you  @servicealert investigate

@servicealert  Investigating monitor “Checkout API” (down 4m)

  Hypotheses
   1. High  Stripe webhook timeout (was healthy 6m ago)
   2. Med   Recent deploy at 14:02 touched billing/
   3. Low   DNS propagation lag (resolver diff: 0)

  Logs (3)  ·  Deploys (1)  ·  Code
  → api/billing/stripe.php:142 in commit 3a4f9b1

  React 👍 to promote, ❌ to silence, 🚨 to declare
Monitor: api.acme.com
us-east (Azure)112 ms2s ago eu-west (yours)38 ms3s ago ap-south (yours)timeout4s ago sa-east (Azure)241 ms2s ago
Quorum: majority · 1 of 4 down · no alert fired

Multi-region monitoring agents

Run uptime checks from anywhere. Drop a single Go binary onto any host, AWS region, on-prem datacenter, or branch office, and it joins your monitor pool as a check-running region next to ServiceAlert’s central probes. Per-monitor alert quorum eliminates false positives from single-region carrier flakes.

  • Quorum-based alerting — require any, majority, or all regions to agree before paging
  • Region pills on every monitor show last-check latency from each source
  • Hairpin-NAT guard skips checks where a target resolves to the agent itself, so private-network monitors stay accurate
  • Ships as a systemd unit with proper Linux capabilities — ICMP and TCP probes run without root
  • Register-agent CLI writes the env file at 0600 so registration tokens never land in shell history

View Monitoring Agents →

Browser-step transaction monitoring

Multi-step user flows now run as full Playwright browser sessions when you need them — real JavaScript, screenshots at every step, authenticated cookies, and per-step assertions on text, status code, or response body. The browser worker is a dedicated daemon driving system Chrome over a unix socket, so memory stays bounded and step latencies are consistent across runs.

  • Login → cart → checkout → success flows your synthetic tests can’t fake
  • Per-step screenshots attached to every failure so a 3am page comes with evidence
  • Falls back to lightweight HTTP transaction runner when a flow doesn’t need a real browser
  • Pingdom Real Browser fidelity at a fraction of the price

Configure Transaction Monitors →

Acme Checkout Flow · passed
Open /login412 ms Fill email + password87 ms Click “Sign in”1.8 s Add to cart340 ms Assert “1 item in cart”12 ms Click “Checkout”920 ms Assert URL == /success8 ms

Native on-call scheduling, with iCal feeds

Real on-call rotations land natively in the dashboard. Build a schedule, set the rotation cadence, pin shifts to a timezone, and the rotation timeline renders the next 30 days color-coded by responder. Each schedule exports an iCal subscribe URL so on-call shows up automatically in Google Calendar, iOS Calendar, or Outlook. Cover-request workflow lets a teammate flag an upcoming shift and a covering responder accepts in one click. Replaces PagerDuty schedules for most teams.

Schedules + rotations
Daily, weekly, or custom cadence with timezone-aware shifts
iCal calendar feed
Subscribe in Google Cal, iOS, or Outlook with a single URL
Cover requests
Flag a shift, teammate accepts in one click, both get email trail
Commander auto-assign
Whoever is on-call when an incident is declared becomes commander

Set up On-Call Schedules →

Watch your own sites and APIs

HTTP, ping, TCP, DNS, SSL, domain expiry, and heartbeat checks from a single dashboard. Checks run as frequently as every 30 seconds.

  • Response time charts with 1-minute to 1-day granularity
  • SSL expiry and domain expiry warnings before they lapse
  • Public status pages you can share with your users
  • Alerts on all 7 channels when a monitor goes down or recovers

HTTP

Status codes, response time, keyword matching

Ping

ICMP reachability checks

TCP

Port connectivity checks

DNS

Record resolution, propagation, and nameserver checks

SSL Certificates

Deep TLS analysis with SSL Labs-style grading (A+ through F), protocol & cipher testing, chain validation, CT log monitoring

Domain

Domain expiry tracking

Heartbeat

Passive pings for cron jobs, background workers, and scheduled tasks

History, trends, and vendor risk

Every incident is recorded with AI-generated summaries. Track reliability trends, SLA compliance, and vendor risk across weeks and months.

  • Searchable incident history with per-provider timelines
  • AI-powered incident summaries, plain-English explanations of what happened, what was affected, and how long it lasted
  • SLA compliance tracking, measure vendor uptime against their published SLAs
  • Incident analytics, frequency charts, severity breakdowns, MTTR trends, and worst-affected services
  • Uptime scorecards, reliability rankings, and monthly reports with category breakdowns
  • Vendor comparison tools for procurement and risk review
Recent Incidents
Okta Authentication failures 47m
Cloudflare Elevated latency 1h 22m
GitHub Actions unavailable 2h 5m
Datadog Delayed metric ingestion 34m

SSL Labs-style grading for every certificate

Deep TLS analysis that matches Qualys SSL Labs, but integrated into your monitoring dashboard with automated alerts. Know your security posture before attackers do.

  • Letter grades A+ through F, weighted scoring across protocol support (30%), key exchange (30%), and cipher strength (40%)
  • Protocol & cipher analysis, tests SSL 2/3, TLS 1.0-1.3, enumerates every accepted cipher suite with forward secrecy and AEAD tagging
  • Vulnerability checks, Heartbleed, POODLE, CRIME, BEAST, secure renegotiation, downgrade prevention
  • Certificate lifecycle monitoring, chain validation, OCSP/CRL revocation, renewal forecasting, expiry alerts, change detection
  • HSTS preload list checking, queries Google's official preload list and validates whether your served HSTS header meets browser preload requirements (max-age ≥ 1 year, includeSubDomains, preload directive)
  • CAA policy validation, maps the cert's issuer to its canonical CAA identifier across 40+ CAs and flags violations when a cert was issued by a CA not in the published CAA whitelist
  • TLS 1.3 enforcement reporting, aggregates protocol support and reports NIST SP 800-52 Rev 2 / PCI-DSS 4.0 compliance with plain-English remediation steps
  • Certificate Transparency monitoring, watches public CT logs for rogue or unauthorized certificates issued for your domains
  • Free public SSL test tool, scan any domain instantly, no account required
SSL Security Report
A+
example.com
Score: 96/100
100
Protocol
100
Key Exchange
90
Cipher
TLS 1.3 Supported
HSTS Preload enabled
Heartbleed Not vulnerable

Full CLM platform, discover, govern, audit

Beyond expiry alerts. A complete certificate lifecycle management system that competes with Keyfactor and Venafi at a fraction of the price. Discovery, ownership, policy enforcement, compliance reporting, all integrated.

  • Auto-Discovery via CT logs, find every certificate ever issued for your domain via CertSpotter and crt.sh, with one-click adoption into monitoring
  • Renewal forecasting, CA-aware predictions that know Let's Encrypt renews every 90 days, DigiCert annually, Amazon ACM 60 days early. Calendar timeline view with iCal export
  • Ownership & escalation, assign primary, secondary, and team lead owners per certificate. Unacknowledged alerts auto-escalate through the chain after 4 hours
  • Policy engine, define org-wide rules (min RSA 4096, only DigiCert/Let's Encrypt, TLS 1.3 required, HSTS mandatory) with 5 prebuilt templates: PCI-DSS Baseline, NIST 800-52, Zero Trust, Let's Encrypt Best Practices, SOC 2 Type II
  • OCSP/CRL revocation monitoring, checks OCSP responders, OCSP stapling, and CRL fallback. Alerts if any monitored cert is revoked
  • Multi-environment tracking, scans every IP behind your domain (CDN edges, load balancers) and detects when staging, prod, or edge nodes serve different certificates
  • Compliance reports, audit-ready PDFs for PCI-DSS 4.0, SOC 2 CC7.1, and NIST SP 800-52 Rev 2 with per-control findings, evidence, and remediation recommendations. Historical trending included
  • CA risk monitoring, alerts when your certificate authority loses browser trust (Entrust 2024, Symantec 2017, TrustCor 2022). Tracks active and historical distrust events
  • Cryptographic Posture Score, single 0-100 score across your certificate estate. Weighted across 7 factors: grade health, expiry, protocol strength, chain integrity, policy compliance, ownership coverage, and revocation status
  • Custom metadata tags & certificate diff view, tag certs with department, app, cost center for filtering. Visual side-by-side diff on every change showing fingerprint, issuer, expiry, and SAN deltas
Cryptographic Posture
87
Grade A
42 certificates evaluated
Grade Health
92
Expiry Health
88
Protocol Strength
80
Chain Integrity
100
Policy Compliance
75

Free public tools and crowd intelligence, no signup required

A growing set of visitor-facing tools and signals that work without an account. They drive the SEO flywheel, help random Googlers in a moment of panic, and double as a credibility moat for the paid product.

  • Crowd-sourced "I'm having issues" reporting on every service status page and every "is it down?" answer page. Visitors click one of four category buttons (Service Down / Slow / Errors / Intermittent) and the report feeds the live 24-hour spike chart, the geographic heatmap, and the Early Warning Signal pipeline. Spikes typically detect outages 10-30 minutes before the vendor's own status page admits them.
  • Vendor transparency warnings, per-service status pages flag vendors whose own status page is consistently late. We grade every vendor A-F based on average delay between detection and acknowledgement, and surface a prominent callout when the grade is D or F (e.g. "1Password's official status page is unreliable, on average 20.1 hours late to acknowledge incidents"). Honest vendors get no callout. See the full vendor transparency leaderboard.
  • Free public utility tools, Status Checker, DNS Lookup, WHOIS Lookup, Response Time, SLA Calculator, and Downtime Calculator. All free, all unauthenticated, all in the free tools collection.
  • Live outage map at /outage-map, a real-time geographic view of every active vendor incident, sized by user-report volume so the noise floor stays low and the signal pops.
servicealert.ai/is-down

Status check

PARTIAL OUTAGE
340 user reports / 1h
Reddit chatter spike
Caught 18m before vendor
API + Dashboard impacted

Live from servicealert.ai

Declare, coordinate, and post-mortem

A full incident lifecycle built in, no separate Datadog or PagerDuty subscription required. Declare an incident, track the timeline, update your status page, coordinate in a dedicated Slack channel, and generate a post-mortem when it's resolved.

  • Full SEV1-SEV4 lifecycle, declare incidents manually or auto-link from a triggered monitor. Track state across Investigating → Identified → Monitoring → Resolved with timestamps for every transition
  • Public timeline updates, post public or internal-only updates that flow directly to the linked status page. Active SEV1/SEV2 incidents automatically update the status banner your customers see
  • Responder assignment, designate Commander, Responders, Communicators, and Observers from your team. Each role gets appropriate notifications and access
  • Slack war rooms, OAuth-based Slack App that auto-creates a dedicated channel (inc-42-db-connectivity) on declaration, invites responders by email, posts timeline updates as rich messages, and archives the channel on resolve
  • AI-generated post-mortems, Claude drafts a full post-mortem from the incident timeline on resolve, with a Draft → In Review → Published workflow so your team keeps editorial control
  • Metrics dashboard, 30-day MTTR, time-to-detect, severity breakdown, and daily incident sparkline so you can show the board your response is improving
  • Incident templates, save common incident types (DB failover, DDoS, cert expiry) for one-click declaration with pre-filled severity, title, and runbook
Active Incidents
1 SEV1 2 SEV2 MTTR 42m
SEV1 Checkout DB connectivity Identified
SEV2 API p99 latency Monitoring
slack #inc-42-checkout-db created
AI Post-mortem draft ready

Your entire stack at a glance

A real-time honeycomb grid that maps every tracked service and uptime monitor to a color-coded hex. Purpose-built for NOC walls and operations centers, one glance tells your team the health of every dependency.

  • Services and monitors combined in one unified grid
  • TV & NOC mode, one-click fullscreen with oversized hexes, auto-refresh, and zero UI chrome. Purpose-built for wall-mounted displays and conference room dashboards
  • Hexes flip color instantly when a status changes
  • Team view shows team services and team monitors together
See Eagle Eye Live →
AWS
GitHub
Slack
Azure
Stripe
Okta
GCP
api.acme
Zoom
Datadog
Sentry
staging

Services + monitors in one view

Branded status pages your customers trust

Give your customers transparency without the noise. Create public or private status pages tied to your monitors, branded with your logo and custom CSS. When something goes down, your status page updates automatically.

  • Custom branding, upload your logo and apply custom CSS for full brand control
  • Public or private, share broadly with customers or restrict to internal teams with a toggle
  • Monitor selection, pick exactly which monitors appear on each page
  • Live incident display, active and resolved incidents shown automatically with duration and status
  • Multiple pages per account, create separate status pages for different products or audiences
  • Custom domain with auto Let’s Encrypt · New, serve at status.acme.com with TXT verification, then CNAME, and we auto-issue + renew the cert. No certificate management on your end. Atlassian charges $79/mo extra for this.
  • Per-component email subscriptions · New, customers pick the components they care about and only get notified when those change status. Double opt-in, salted-hash IPs, RSS + Atom feeds auto-discovered.
  • Free *.status.servicealert.ai subdomain, branded subdomain like yourbrand.status.servicealert.ai with no DNS setup required, instant activation
Acme Corp Status All Systems Operational
API Operational
Web App Operational
CDN Degraded
Database Operational

Scheduled downtime, zero false alarms

Plan maintenance ahead of time, select the monitors that will be affected, and let ServiceAlert.ai suppress alerts automatically. Scheduled maintenance is displayed on your status pages so your users know what to expect.

  • Scheduled downtime, set a start time, end time, and description for planned work
  • Select affected monitors, choose which monitors are included so only relevant alerts are suppressed
  • Auto-suppress alerts, no false alarms during planned maintenance windows
  • Visible on status pages, upcoming and active maintenance shown to your users automatically
Scheduled Maintenance
scheduled Database migration Mar 31, 2:00 AM
in progress CDN cache purge Now, 1:00 AM
completed SSL certificate rotation Mar 27
Alerts suppressed for 2 monitors during maintenance

Decide exactly who can do what

Granular role-based access control across 11 product categories. Pick from 5 built-in roles, or define your own. Audit-logged, scoped to teams, and enforced at every layer, backend, frontend, and API.

  • 4 built-in roles, Owner, Editor, Certificate Manager, Auditor (read-only)
  • Unlimited custom roles like “Tier 1 SOC” or “Compliance Reviewer”, define them once, assign with one click
  • Per-user permissions drawer with None / View / Manage toggles for every category
  • Bulk operations, select dozens of users and apply a role in one action
  • Multi-team membership, one user can belong to several teams with per-team Lead status
  • Audit logs capture every mutation with actor, IP, and timestamp, filter, export, satisfy your SOC 2 auditor
  • Scoped API keys, give your CI pipeline a key restricted to monitors only, or compliance scripts a read-only key, without sharing user credentials
See It Live →
Acme DevOps Team View
Team Monitors
api.acme.com Alex C. TEAM
auth.acme.com Sam R. TEAM
Personal Monitors
my-blog.com HTTP

Build on top of our data

A versioned REST API with public and premium endpoints. Pull real-time status, incidents, SLA compliance, reliability scores, and trend data into your own tools.

  • Public endpoints for services, status, and incidents, no auth required
  • Premium endpoints for SLA, scores, rankings, and trends with API key
  • Rate-limited with clear headers, 30 req/min public, 120 req/min with key
  • JSON responses with consistent envelope, historical data via ?month= param
View API Docs →
Example Request
curl -H "X-API-Key: sa_live_..." \ /api/v1/scores/github { "success": true, "data": { "feedId": "github", "score": 97.2, "grade": "A", "tier": "excellent" } }

See it live, right now

The dashboard is free and open. Sign up when you're ready for alerts.