Overview
Returns all automation triggers configured for your tenant. Triggers define conditions that automatically start actions — such as kicking off an investigation when a specific alert pattern arrives.
Required role: admin or member
JWT Bearer token. Format: Bearer <your-jwt>.
Query parameters
Filter by enabled/disabled status.
Filter by the event type the trigger listens for (e.g. incident.created).
Maximum results. Default: 50. Maximum: 200.
Pagination cursor from a previous response.
Response
Returns 200 OK.
{
"items": [
{
"triggerId": "trg_01HX9VTPQR3KF8MZWBYD5N6JCE",
"name": "Auto-investigate critical incidents",
"eventType": "incident.created",
"conditions": {
"severity": ["critical", "high"]
},
"action": "start_investigation",
"enabled": true,
"createdAt": "2024-04-01T09:00:00Z"
}
],
"total": 3,
"nextCursor": null
}
| Field | Type | Description |
|---|
triggerId | string | Unique trigger identifier |
name | string | Human-readable trigger name |
eventType | string | Event that fires this trigger |
conditions | object | Filter conditions (e.g. severity filter) |
action | string | Action to take when triggered |
enabled | boolean | Whether this trigger is active |
Error responses
| Status | Error code | Description |
|---|
401 | unauthorized | Missing or invalid JWT |
403 | forbidden | Caller lacks required role |
Examples
curl "https://api.causeflow.ai/v1/triggers?enabled=true" \
-H "Authorization: Bearer eyJhbGc..."
Create trigger
Add a new automation trigger
Delete trigger
Remove a trigger