Use this file to discover all available pages before exploring further.
Monitoring integrations work by sending alerts to CauseFlow via webhooks. When an alert arrives, CauseFlow immediately triages it and — depending on severity — dispatches specialized agents to investigate root cause, inspect infrastructure, and propose a fix.
Every monitoring integration uses the same inbound webhook path. CauseFlow parses each provider’s native alert format, normalizes it into a single incident shape, and runs the same investigation pipeline regardless of source.
Go to Settings > API Keys and click Create key. Give it a descriptive name (for example, “Datadog monitoring”). Copy the key — it will not be shown again.
2
Note your webhook secret
When you create the API key, CauseFlow also generates a webhook secret for HMAC signature verification. Copy it too.
3
Configure the webhook in your monitoring tool
Use the webhook URL for your provider and add the required headers. See the provider-specific sections below.
4
Test the connection
Send a test alert from your monitoring tool. The incoming event should appear in Dashboard > Incidents within a few seconds.
CauseFlow deduplicates alerts using the sourceAlertId field in the normalized payload. Duplicate alerts return 409 Conflict — the original incident remains open and is not duplicated.
CauseFlow receives Datadog monitor alerts as webhook notifications. When a monitor triggers, Datadog sends a JSON payload to your CauseFlow webhook URL. CauseFlow parses the Datadog format and creates an incident immediately.
Alerts not appearing: Confirm the X-API-Key header is present and correct. Datadog does not support HMAC-signed payloads natively — the X-Webhook-Signature header is not required for Datadog. Contact support@causeflow.ai if you need signature enforcement for Datadog.Duplicate incidents: Check that the same monitor is not sending to multiple CauseFlow webhook URLs.
CauseFlow registers as a Grafana contact point. When an alert rule fires, Grafana sends a notification to your CauseFlow webhook URL. CauseFlow parses the Grafana alerting format and creates an incident.
401 Unauthorized: Confirm both X-API-Key and X-Webhook-Signature headers are present. For the HMAC signature, sign the raw request body with your webhook secret using HMAC-SHA256.Grafana OnCall not triggering: Add the webhook contact point as an outgoing webhook in Grafana OnCall > Integrations > Outgoing webhooks.
CauseFlow receives CloudWatch alarms via Amazon SNS HTTP subscriptions. Your CloudWatch alarm notifies an SNS topic, and the topic delivers the notification to CauseFlow via an HTTPS subscription.
To use CloudWatch as a monitoring trigger, you must also complete the AWS cloud provider setup. The cloud provider connection gives CauseFlow the read-only IAM role it needs to pull logs and metrics during investigation.
Go to Settings > API Keys and click Create key. Name it “CloudWatch webhook”.
2
Create an SNS topic
In your AWS account, create an SNS topic (or use an existing topic connected to your CloudWatch alarms).
3
Create an HTTPS subscription
Create an HTTPS subscription on the topic with the endpoint set to your CauseFlow CloudWatch webhook URL. CauseFlow automatically confirms the SNS subscription when the confirmation request arrives.
4
Add the API key header
SNS HTTPS subscriptions do not support custom headers natively. For production use, deploy a lightweight proxy (AWS Lambda or API Gateway) that adds the X-API-Key header before forwarding to CauseFlow.
5
Connect CloudWatch alarms to the SNS topic
In CloudWatch, edit your alarm actions to notify the SNS topic you created.
A sample Lambda proxy template is available in the CauseFlow examples repository. It adds the required X-API-Key header to every SNS notification before forwarding to CauseFlow.
Subscription confirmation not received: Confirm the webhook URL is correct and publicly reachable. CauseFlow confirms SNS subscriptions automatically on receipt of the SubscriptionConfirmation message type.401 Unauthorized: SNS sends requests without custom headers. Deploy the Lambda proxy to add the X-API-Key header.
CauseFlow receives Sentry issue and alert events via Sentry’s webhooks integration. When an issue is created or an alert fires, Sentry sends a notification to your CauseFlow webhook URL.
Noisy alerts: Configure Sentry alert rules with a frequency threshold (for example, “at least 10 occurrences in 5 minutes”) before forwarding to CauseFlow to reduce noise.Signature mismatch: Confirm the HMAC-SHA256 signature is computed over the raw request body (before JSON parsing) and hex-encoded.
CauseFlow receives PagerDuty incident events via webhooks. When a PagerDuty incident is triggered or acknowledged, the event is forwarded to CauseFlow, which creates or updates the corresponding investigation.
Events not appearing: Confirm the webhook is scoped to the correct PagerDuty service. Webhooks scoped at the account level will receive events from all services.
CauseFlow receives New Relic alert notifications via a webhook notification channel. When an alert policy fires, New Relic sends a JSON payload to your CauseFlow webhook URL.
401 Unauthorized: Confirm the X-API-Key header value matches the API key shown in CauseFlow’s Settings > API Keys.No incidents appearing: Confirm the notification channel is attached to at least one alert policy and that the policy has at least one active condition.
Cloud providers
Set up cross-account IAM roles for AWS, Azure, and GCP infrastructure access.
Custom webhooks
Send alerts from any tool not in this list using the generic webhook endpoint.