Skip to main content
GET
/
v1
/
triggers
List triggers
curl --request GET \
  --url https://api.example.com/v1/triggers \
  --header 'Authorization: <authorization>'

Overview

Returns all automation triggers configured for your tenant. Triggers define conditions that automatically start actions — such as kicking off an investigation when a specific alert pattern arrives. Required role: admin or member

Request headers

Authorization
string
required
JWT Bearer token. Format: Bearer <your-jwt>.

Query parameters

enabled
boolean
Filter by enabled/disabled status.
eventType
string
Filter by the event type the trigger listens for (e.g. incident.created).
limit
integer
Maximum results. Default: 50. Maximum: 200.
cursor
string
Pagination cursor from a previous response.

Response

Returns 200 OK.
{
  "items": [
    {
      "triggerId": "trg_01HX9VTPQR3KF8MZWBYD5N6JCE",
      "name": "Auto-investigate critical incidents",
      "eventType": "incident.created",
      "conditions": {
        "severity": ["critical", "high"]
      },
      "action": "start_investigation",
      "enabled": true,
      "createdAt": "2024-04-01T09:00:00Z"
    }
  ],
  "total": 3,
  "nextCursor": null
}
FieldTypeDescription
triggerIdstringUnique trigger identifier
namestringHuman-readable trigger name
eventTypestringEvent that fires this trigger
conditionsobjectFilter conditions (e.g. severity filter)
actionstringAction to take when triggered
enabledbooleanWhether this trigger is active

Error responses

StatusError codeDescription
401unauthorizedMissing or invalid JWT
403forbiddenCaller lacks required role

Examples

curl "https://api.causeflow.ai/v1/triggers?enabled=true" \
  -H "Authorization: Bearer eyJhbGc..."

Create trigger

Add a new automation trigger

Delete trigger

Remove a trigger