Skip to main content
The alert command group manages security and operational alerts generated by InfraAudit scans and monitoring rules. You can filter alerts by severity, type, and status, and acknowledge or resolve them from the CLI.

alert list

List alerts with optional filters. Synopsis:
infraudit alert list [flags]
FlagValuesDescription
--severitycritical, high, medium, lowFilter by severity level
--statusopen, acknowledged, resolvedFilter by alert status
--typesecurity, compliance, performanceFilter by alert category
Examples:
# List all open alerts
infraudit alert list

# Show high and critical open alerts
infraudit alert list --severity high --status open

# List security alerts
infraudit alert list --type security

# Count open critical alerts for CI gating
infraudit alert list --severity critical --status open -o json | jq 'length'

alert get

Show full details for a specific alert, including the affected resource, trigger condition, and recommended action: Synopsis:
infraudit alert get <alert-id>
Example:
infraudit alert get 12

alert summary

Show an aggregate count of alerts grouped by severity and status:
infraudit alert summary

alert acknowledge

Acknowledge an alert to indicate that it has been seen and is under investigation. The alert remains open until resolved: Synopsis:
infraudit alert acknowledge <alert-id>
Example:
infraudit alert acknowledge 12

alert resolve

Mark an alert as resolved after addressing the underlying condition: Synopsis:
infraudit alert resolve <alert-id>
Example:
infraudit alert resolve 12
To receive alerts via Slack, email, or webhook without polling the CLI, configure notification channels with infraudit notification or webhooks with infraudit webhook.