Sleuth Documentation
HomeBlogSupportSign up
  • Getting started
  • Navigating Sleuth
  • DORA metrics
    • Deploy frequency
    • Change lead time
    • Change failure rate
    • MTTR
    • Interpreting Metrics in Sleuth
  • Deployment tracking
    • Organization
      • Labels
      • Trends
      • Compare
      • Search
      • Status
    • Projects
      • Issue trackers
    • Environments
    • Code deployments
      • Creating a deployment
      • How to register a deploy
      • Rollbacks
      • Automatic tagging
      • Deployment locking
      • Environment drift
      • Move code deployments
      • Search everything
    • Feature flags
    • Manual changes
    • Deploys
    • Teams
  • Work in Progress
  • Goals
  • Sleuth Automations
    • Automations Marketplace
      • Installing Automations
        • Installing PR "Update" Automations
      • Editing and uninstalling Automations
      • Smart suggestions
      • Understanding efficacy
    • Custom Automations
      • Automations Cookbook
      • Webhook Actions
      • Trigger Build Actions
        • Bitbucket Pipelines
        • CircleCI
        • Github Actions
        • Jenkins
  • Slack & Email Notifications
  • Auto-verify deploys
    • Anomaly detection
    • Error impact
    • Metric impact
  • Ignoring pull requests
  • Slack mission control
    • Approvals
    • Project notifications
    • Personal notifications
    • Search Sleuth in Slack
    • Project/Deployment history
    • Developer standup
  • Sleuth API
    • Deploy Registration
    • Deploy import
    • Manual Change
    • Custom Incident Impact Registration
    • Custom Metric Impact Registration
    • Deprecation information
    • GraphQL Queries
    • GraphQL Mutations
    • Query batching
  • Integrations
    • About Integrations...
    • Code integrations (read-only)
      • Azure DevOps
      • Bitbucket
      • GitHub
      • GitLab
      • Custom Git
      • Terraform Cloud
    • Code integrations (write)
    • Feature flag integrations
      • LaunchDarkly
    • Impact integrations
      • Error trackers
        • Bugsnag
        • Honeybadger
        • Rollbar
        • Sentry
      • Metric trackers
        • AppDynamics
        • AWS CloudWatch
        • Custom
        • Datadog
        • Jira metrics (Cloud / Data Center)
        • NewRelic
        • SignalFx
      • Incident tracker integrations
        • Blameless
        • PagerDuty
        • Datadog Monitors
        • Statuspage
        • Opsgenie
        • Jira (Cloud/Data Center)
        • FireHydrant
        • Rootly
        • ServiceNow
        • Custom
          • Grafana OnCall
      • CI/CD builds
        • Azure Pipelines
        • Bitbucket Pipelines
        • Buildkite
        • CircleCI
        • GitHub Actions
        • GitLab CI/CD Pipelines
        • Jenkins
    • Sleuth DORA App for Slack
    • Microsoft Teams integration
    • CI/CD integrations
      • Azure Pipelines
      • Bitbucket Pipelines
      • Buildkite
      • CircleCI
      • Github Actions
      • GitLab CI/CD Pipelines
      • Jenkins
    • Issue tracker integrations
      • Jira Cloud
      • Jira Data Center
      • Linear
      • Shortcut
    • Fixing broken integrations
  • Pulse
    • Welcome to Pulse docs
    • Quick Start setup guide
    • Beginner tutorials
      • 1. How to create a Teamspace
      • 2. How to create a Review
      • 3. How to create a Survey
  • Features
    • Reviews
      • Review workflow
      • Review templates
      • Widgets and Sections
        • Widget type
      • Review settings
    • Surveys
      • Survey Workflow
    • Teamspaces
    • Inbox
    • AI assistant
    • General settings
      • Users and Teams
      • Investment mix
  • Settings
    • Organization settings
      • Details
      • Authentication
        • SAML 2.0 Setup
          • Okta Configuration
          • Azure AD Configuration
          • PingIdentity Configuration
      • Access Tokens
      • Members
      • Team Settings
      • Billing
    • Project settings
      • Details
      • Slack settings
      • Environment settings
      • Code deployment settings
      • Feature flag settings
      • Impact settings
    • Account settings
      • Account settings
      • Notifications settings
      • Identities settings
    • Role Based Access Control
  • Resources
    • FAQ
    • Sleuth TV
    • Purchasing
    • About Sleuth...
Powered by GitBook
On this page

Was this helpful?

  1. Settings
  2. Project settings

Details

PreviousProject settingsNextSlack settings

Last updated 6 months ago

Was this helpful?

The Details tab contains general information about the selected project. The name of selected project is displayed at the top of the sidebar. Select the "Switch to" dropdown to select a different project, if you have more than one.

You can change the name of your project in the Details tab, along with an optional Description for the project. This is helpful if you are on a large team with multiple projects within the organization.

Advanced settings

Change failure rate boundary

This setting lets you define the lowest health state that should be considered a failure by Sleuth. It is used to calculate Failure rate and MTTR.

Raising this value (e.g. from Unhealthy to Incident) will mean that fewer events will be classified as failures.

The correct setting very much depends on how you configured your impact sources and what your organization generally considers to be production failures.

Change failure sensitivity

This setting represents the amount of time (in minutes) a deploy must spend in a failure status (see Change failure rate boundary above for details) before it is determined a failure and will count towards the failure rate of the project.

The default setting is 7 minutes. Setting this value to a longer time means that fewer events will be classified as failures.

Using the default setting of 7 minutes, if any given deploy has had a failure registered for less than 7 minutes it will not count towards the failure rate of the project. If the failure status (e.g. an incident) has lasted for 7 minutes or longer, the deploy will now count towards the failure rate of the project.

Health autodetect sensitivity

This setting controls how many minutes Sleuth takes into account when auto-determining the health of a deploy. As a part of this health-check Sleuth will send notifications about said deploy.

Based on the selected setting (Fine (6 minutes), Normal (18 minutes), or Coarse (30 minutes)), Sleuth will take the selected number of minutes and divide that time into the max. number of 3-minute windows (2, 6, or 10 respectively). Sleuth will then calculate the worst environment health in each individual window, and finally calculate the average of all the windows to get to the final result.

Important to note, that what is being calculated is the ENVIRONMENT HEALTH, not the deploy health. So the set period length doesn't start from the moment the deploy is registered forward, Sleuth actually looks backward, to the past X minutes from the moment the deploy was registered for an environment.

One way to illustrate how this works would be:

Another important thing to note, this setting only pertains to Error Impact Sources and/or Metric Impact Sources, if an Incident Impact Source is reporting an incident, that is taken at face value and no averages are calculated.

That is all to say, that the notification will always be sent out around 6 minutes post deploy registration in Sleuth, the difference is in how big of a past time window prior to the deploy being registered Sleuth should consider when determining whether the deploy is healthy or not.

If you set this to Fine, we will use less time to calculate the overall health of the environment and vice-versa if you set it to Coarse.

The best setting here will be a trade off between response time and detection reliability. If you're being alerted too often on account of minor anomalies, choose Coarse. If you want to be alerted sooner and with higher sensitivity, choose Fine.

Change lead time settings

Start definition

See the detailed explanation of the different options

Strict issue matching

When enabled Sleuth will only look for issue references in PR titles and PR branch names. If strict issue matching is disabled, Sleuth will expand the search for issue references to PR descriptions and commit messages.

Locking

Press Save after making any changes in the Details tab.

Rollback detection

You can also change the default issue tracker for the selected project and, if a integration has been established, a default build server. Selecting a build server is optional, but at least one default or must be selected for your project. A link to enable an issue tracker is provided if the integration has not yet been made in the organization.

This setting lets you disable for all deployments in the project.

Only certain members can create an integration for the organization. See for more information.

This setting allows you to disable . There are some scenarios where you don't want Sleuth to detect rollbacks or include them as change failures.

Build
issue tracker
code deployment
deployment locking
Access Control
rollback detection
Starting CLT based on first issue transition