Cased
Rika Sun Rika Sun

Configure CloudWatch Alarms Without Opening AWS Console

Set up AWS monitoring conversationally - no console clicking, no repetitive configuration
Configure CloudWatch Alarms Without Opening AWS Console

Setting up CloudWatch alarms in the AWS Console is a pain: obscure metric names, unclear threshold numbers (are those bytes, megabytes?), and confusing UX. Then you have to setup SNS topics and subscriptions, and manually repeat this process for every single resource you want to monitor. So we built something better.

Just Say What You Want

Tell the agent: “monitor production RDS CPU usage”.

And that’s it. Cased asks a few quick follow-up questions, discovers all your RDS instances, recommends appropriate alarms based on best practices, and creates everything in AWS.

Conversational CloudWatch alarm setup in Cased

How It Works

When you create a workflow with a CloudWatch alarm trigger in Cased:

  1. Describe what to monitor - “Monitor production RDS CPU”
  2. Answer follow-up questions (max 3) - Cased can mostly figure it out from there, but will ask for more if tf needs to.
  3. Pick recommended alarms - Best practice thresholds and evaluation periods suggested
  4. Confirm - Everything gets created in AWS with SNS configuration

The whole setup takes under a minute. One conversation sets up monitoring across all your resources. In the AWS Console, you’d repeat this process manually for each instance.

From Alarms to Action

Traditional CloudWatch alarms just send an email, and it joins 47 other “critical” alerts in your backlog.

With Cased, alarms trigger workflows that actually investigate and respond. Here are realistic workflow prompts teams use:

Database Performance Investigation

When the RDS CPU alarm fires:
1. Pull current database metrics (CPU, connections, memory)
2. Check for slow queries in the last 15 minutes
3. Look for recent deployments that might have caused the spike
4. Analyze connection pool configurations in application code
5. Post summary to #infrastructure-alerts with recommendations

ALB Health Check

When ALB 5xx errors spike:
1. Identify which target instances are returning errors
2. Check ECS task health and resource utilization
3. Review recent deployments to the affected service
4. Examine application logs for the error pattern
5. Post incident summary to Slack with next steps

Auto-Scaling Response

When EC2 CPU exceeds 80%:
1. Check what processes are consuming CPU
2. Verify auto-scaling is working correctly
3. Compare current load to historical baselines
4. Check if this correlates with a recent deployment
5. Recommend scaling action or code optimization

Real CloudWatch alarms created by Cased with workflow triggers Real production alarms monitoring ALB 404 errors. Cased creates the alarms in CloudWatch and triggers workflows when they fire.

Set up CloudWatch alarms in Cased →