Skip to main content
Alert sources connect external monitoring tools to incident.io, bringing issues detected across your systems into your on-call workflow. Once configured, alert sources form the entry point for routing to on-call teams, triggering escalations, and creating incidents. To add and configure an alert source:
  1. Using the sidebar, navigate to Settings → Alerts
  2. Click the + button to add alert sources
  3. Select your alert source, choosing from native integrations, HTTP sources, or email sources and click Continue
  4. Follow the in-dashboard instructions to connect, send test alerts, and complete setup
incident.io also supports live phone call routing for voice-based alerts.

Native integrations

Connect observability platforms, cloud providers, error tracking tools, uptime monitors, ticketing platforms and more, with pre-configured integrations. Receive alerts when metrics breach thresholds, applications throw errors, services go down, or security threats are detected.
https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/aws.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=60f56b3c5c2a509d00dffd25fff68f97

AWS CloudWatch

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/aws.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=60f56b3c5c2a509d00dffd25fff68f97

AWS SNS

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/microsoft.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=2866fbad767a17bc75a3e53c6ef2f80b

Azure Monitor

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/bugsnag.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=7cf2fe9fe76c49d8477e086df1d5973a

BugSnag

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/checkly.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=d013b7cc5c8eecdeaefaefb992ed4e27

Checkly

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/chronosphere.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=5176b518842c0399b7932145bfbdf009

Chronosphere

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/cloudflare.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=a4a96386655b3f2204acd3d543c3cd0b

Cloudflare

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/coralogix.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=2dd0a84e9b97fc87e5770a20b1894053

Coralogix

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/cronitor.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=8df29a223010cc306953c084dc030dd9

Cronitor

https://mintcdn.com/incidentio-18bb4170/dVs5B9vdcFcyrX2T/icons/integrations/crowdstrike.svg?fit=max&auto=format&n=dVs5B9vdcFcyrX2T&q=85&s=38c01d1e01da6291b4cd985fa0c14582

Crowdstrike Falcon

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/datadog.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=8074d90fe096af5e0097f280b1f5277c

Datadog

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/dynatrace.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=8187cdc9d78df993d20afa8b1eb324a3

Dynatrace

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/elastic.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=3d116d285c775c3651e3a3c723a6bae8

Elastic

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/expel.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=45d9767d2908577f6fbb0797e6bdaea0

Expel

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/github.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=70f4944ff4334e09cb3b14a5c979984f

GitHub Issue

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/googlecloud.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=c82114cf14e5f6a947e8a1bcfd19a84d

Google Cloud Platform

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/grafana.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=e202e0e99499fc21b581e77bd5fd08bf

Grafana

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/honeycomb.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=45ab7d548d0fd3b30c4ce9ff7f32aef4

Honeycomb

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/jira.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=012dfbfc5b98ac1cc3e2cadeb5480d56

Jira/ITSM

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/montecarlo.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=b606d2b1fb6289c7f5954dfd142eafc8

Monte Carlo

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/nagios.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=187cc68bbda21ec86e0af18238893ece

Nagios Core

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/newrelic.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=819df298decd6be6ff8650266ea77a1e

New Relic

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/opsgenie.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=c68a4f9defecdb69185a9550e09f5daf

Opsgenie

https://mintcdn.com/incidentio-18bb4170/i0URnTcUZZIDGnHk/icons/integrations/panther.svg?fit=max&auto=format&n=i0URnTcUZZIDGnHk&q=85&s=f88b7b8b83adb3d33dacd2d3109eebed

Panther

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/pagerduty.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=5c44c292621b8e7625fb562dc3c7b141

PagerDuty

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/pingdom.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=1431b23bd81ed6bff9e95f64553f61e0

Pingdom

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/prometheus.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=09262468a0600e1e50e0c1f463881f1d

Prometheus Alertmanager

https://mintcdn.com/incidentio-18bb4170/DH5ZgM9gtjvWKAzh/icons/integrations/prtg.svg?fit=max&auto=format&n=DH5ZgM9gtjvWKAzh&q=85&s=fd78502d1f970be8ad7c6dfc1276f154

PRTG

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/runscope.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=49c97111cc80351e0879d31ee8b3bc6a

Runscope

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/sentry.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=1b4e07e11623ab7edab424cd0ae62ba3

Sentry Issues

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/solarwinds.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=d026e4c24f65496fe1790bc74fa1281b

SolarWinds AppOptics

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/splunk.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=a3869e383ca819a9f254ef31d7984564

Splunk

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/statuscake.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=57c3e04f26cb2374b8f95533667ab112

StatusCake

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/sumologic.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=b70cc397e11cd9222e20b438d2e26963

Sumo Logic

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/uptime.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=4219744aa36489cb367b6e9218fc820d

Uptime.com

https://mintcdn.com/incidentio-18bb4170/d59bRVtvDXI8bGj8/icons/integrations/zendesk.svg?fit=max&auto=format&n=d59bRVtvDXI8bGj8&q=85&s=7c421379b5768491cd1bde44d158a3d2

Zendesk

Default HTTP sources

HTTP sources enable receiving alerts from any tool not covered by the native integrations list. Use default HTTP sources when you control the webhook payload from external tools. incident.io provides a URL endpoint where you send alerts with a custom payload structure.
Expected body structure
{
  "title": "My first alert",
  "description": "Some additional context",
  "deduplication_key": "first-alert",
  "status": "firing",
  "metadata": {
    "team": "core",
    "service": "api"
  }
}
Use the metadata field to set alert attributes for routing and filtering. See the Alert Events API documentation for full field specifications and validation rules.

Custom HTTP sources

Use custom HTTP sources when working with tools that send webhooks with HTTP payload structures that cannot be modified. Write custom JavaScript within these sources to transform those payloads into incident.io’s expected alert format.
Example payload from external tool
{
  "title": "High CPU usage on server-01",
  "status": "firing",
  "description": "CPU usage exceeded 90% threshold",
  "url": "https://monitoring.example.com/alerts/12345",
  "team": "platform",
  "severity": "critical"
}
Your transform expression
// $ represents your incoming payload
return {
  title: $.title ? $.title : 'Custom HTTP alert',
  status: $.status === 'resolved' ? 'resolved' : 'firing',
  description: $.description ? $.description : '',
  source_url: $.url,
  metadata: { team: $.team, severity: $.severity }
}

Email sources

Send emails to a unique email address to create alerts in incident.io automatically. When you create an email source, incident.io generates a unique email address for that source:
Example email address
abc123xyz-f769e4dda22b@inbound.incident.io
Use email sources for:
  • Monitoring tools or scripts that send email notifications but don’t support webhooks
  • Customer support or internal escalations where critical emails should trigger alerts
Each email sent to the address creates a new alert. You can configure how email fields (subject, body, sender) map to alert attributes.

Auto-resolve alerts

Some alert sources — such as email sources or tools that don’t send resolve payloads — will leave alerts in a Firing state indefinitely. Auto-resolve lets you set a timeout after which these alerts are automatically resolved. When enabled on an alert source, any alert that remains in Firing status will be resolved after the configured duration. The timer starts from when the alert first fires, and the duration is selected from the Resolve after dropdown in the alert source configuration. To enable auto-resolve:
  1. Using the sidebar, navigate to Settings → Alerts
  2. Select the alert source you want to configure
  3. Toggle Auto-resolve alerts on
  4. Under Resolve after, choose a duration from the dropdown (e.g., 3 hours)
  5. Click Save
When an alert is auto-resolved, any associated escalations are cancelled and triage incidents can be auto-declined, following your alert route configuration.

Skip auto-resolve for active incidents

You can optionally enable skip auto-resolve if alert is attached to an active incident. When this toggle is on, alerts that are attached to an active incident will not be auto-resolved — even if the configured duration has elapsed. The alert will remain in Firing status for as long as the incident is active, and will only resolved as usual once the incident is no longer active. If the alert is detached from the incident the auto-resolve timer will restart. This is useful when an alert is being actively investigated as part of an incident and you don’t want it to silently resolve while responders are still working on it.
Auto-resolve only applies to alerts created after the setting is enabled. Existing alerts that are already firing will not be affected by changes to the auto-resolve configuration.

Troubleshoot alert sources

Use the Inspect feature to diagnose payload and transformation issues. Click Inspect on any alert to view the original payload, JavaScript expressions, and extraction results. Edit attribute expressions to add fallbacks for unexpected payloads or fix catalog entry mappings.

FAQs

Unlimited. All plans support connecting multiple monitoring tools simultaneously.
No. Native sources use fixed parsing logic. Use attribute expressions or create a custom HTTP source for custom extraction.
Native sources update automatically. For custom HTTP sources, update transform expressions to match the new payload structure.
Yes. Test alerts during alert source setup, and optionally create a test alert route that declines or silences all alerts.
No native heartbeat monitoring. Use third-party uptime monitoring services (Checkly, Cronitor, Uptime.com, Pingdom) with native alert sources, or send heartbeat signals via custom HTTP alert sources.
Check any of the following; wrong payload format, authentication issues, firewall blocking, or rate limiting in your monitoring tool.
Auto-resolve only applies to alerts created after the setting is enabled. If you have existing firing alerts, they will not be automatically resolved. You can resolve them manually from the dashboard, mobile app, or Slack/Microsoft Teams.
Auto-resolve is most useful for alert sources that don’t send resolve payloads, such as email sources or custom HTTP sources from tools that only send firing notifications. Sources like Datadog or Grafana typically send their own resolve events, so auto-resolve is less necessary.
If you have enabled skip auto-resolve if alert is attached to an active incident, the alert will not be auto-resolved while the incident is active. Once the incident is no longer active, or the alert is detached from the incident, auto-resolve will apply as normal.