Skip to main content
CloudThinker integrates with 15+ alerting and monitoring platforms including PagerDuty, Datadog, Grafana, Prometheus, AWS CloudWatch, Azure Monitor, GCP Monitoring, and more. Each integration includes platform-specific field mapping, flexible authentication, and automatic AI investigation triggers.

Supported Platforms

Incident Management

https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/pagerduty-icon.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=7e1bb7c9ae2e6aa13608c8d4d48811cf

PagerDuty

Authentication: HMAC-SHA256On-call management and incident response with native event mapping for triggered, acknowledged, and resolved events.
https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/opsgenie-icon.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=3d1eba78a1a7252aee45c08b7538d020

Opsgenie

Authentication: API KeyAtlassian’s alert management with priority mapping and team assignment data.
https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/service-now.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=0732f3ddc9a9af6f7c3325a74c7aa30a

ServiceNow

Authentication: API KeyEnterprise IT service management with CMDB CI mapping for infrastructure context.

BigPanda

Authentication: Bearer TokenAIOps event correlation and alert management with intelligent alert grouping.

Monitoring & Observability

https://mintcdn.com/cloudthinker/ezLyBgfIZEMSknyR/images/icons/integrations/datadog-icon.svg?fit=max&auto=format&n=ezLyBgfIZEMSknyR&q=85&s=3548a1b2e3bc616d2d37d439eba151c6

Datadog

Authentication: Bearer TokenFull-stack monitoring with metrics, alerts, and tag-based service correlation.
https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/grafana-logo.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=e0a907966b1ad4ff181ef93cb411e373

Grafana

Authentication: Bearer TokenAlert notifications with dashboard links, panel context, and common labels extraction.
https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/prometheus-logo.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=116d0e24c961b3e19e141d98a61ae3b8

Prometheus / Alertmanager

Authentication: Bearer TokenNative Alertmanager webhook receiver with label extraction, grouping support, and Kubernetes metadata.
https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/splunk-logo.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=51fa124f58603c02e7cb344825795746

Splunk

Authentication: Bearer TokenSaved search alerts with result context and search links.

Cloud Provider Alerting

https://mintcdn.com/cloudthinker/ezLyBgfIZEMSknyR/images/icons/integrations/aws-cloudwatch.svg?fit=max&auto=format&n=ezLyBgfIZEMSknyR&q=85&s=9539b73889491ac68c768dc601c6276d

AWS CloudWatch

Authentication: None (URL token)EventBridge-based alerting with alarm state, metric data, and namespace context.
https://mintcdn.com/cloudthinker/ezLyBgfIZEMSknyR/images/icons/integrations/azure-monitor.svg?fit=max&auto=format&n=ezLyBgfIZEMSknyR&q=85&s=b0b37194fd8282e599655adc7b172104

Azure Monitor

Authentication: NoneCommon Alert Schema support with resource context and severity mapping.
https://mintcdn.com/cloudthinker/ezLyBgfIZEMSknyR/images/icons/integrations/gcp-monitoring.svg?fit=max&auto=format&n=ezLyBgfIZEMSknyR&q=85&s=d1316eb20b417d6afd7814699236ebcf

GCP Monitoring

Authentication: Bearer TokenIncident notifications with policy details and resource display names.

APM & Error Tracking

https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/new-relic.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=f302e6dc3976df413a0ebe8fa92da32d

New Relic

Authentication: API KeyFull-stack observability with issue priorities and entity context.
https://mintcdn.com/cloudthinker/ezLyBgfIZEMSknyR/images/icons/integrations/dynatrace.svg?fit=max&auto=format&n=ezLyBgfIZEMSknyR&q=85&s=d1c94ab707135fdc0bd47de611b56760

Dynatrace

Authentication: API KeySoftware intelligence with problem impact analysis and AI-detected root causes.
https://mintcdn.com/cloudthinker/NZTEnySYVy068g6u/images/icons/integrations/sentry-logo.svg?fit=max&auto=format&n=NZTEnySYVy068g6u&q=85&s=b7af115d7baa85cf43f93e80cb319cd4

Sentry

Authentication: HMAC-SHA256Application error tracking with issue details, stack traces, and project context.

Custom Integration

Generic Webhook

Authentication: Bearer Token (configurable)Fully customizable webhook for any platform. Define your own field mappings using JSONPath expressions.
Platform Roadmap: Don’t see your platform listed? Use the Generic Webhook for immediate integration, or contact support to request a native connector for your monitoring tool.

Setting Up a Webhook Integration

The setup wizard guides you through platform selection, webhook configuration, and automatic root cause analysis settings.
Incident Response setup wizard home page with AI-powered root cause analysis overview

Incident Response dashboard with setup wizard entry point

1

Navigate to Integrations

Go to IncidentsSettingsIntegrations tab to access webhook management.
2

Create Webhook

Click Connect on your platform card. The creation wizard opens with platform-specific defaults pre-configured.
Platform selection modal showing monitoring and alerting platform options including PagerDuty, Datadog, Grafana, and AWS CloudWatch

Select your monitoring platform from the available options

3

Configure Basic Info

Enter a name and optional description for your webhook. Set a rate limit if needed (default: 100 requests per hour).
4

Review Field Mapping

Each platform has pre-configured JSONPath mappings that extract incident fields from your webhook payload. Customize if needed:
Incident FieldExample JSONPathDescription
Title$.event.data.titleIncident headline
Description$.event.data.descriptionDetailed information
Severity$.event.data.priorityCritical, High, Medium, Low, Info
Services$.event.data.service.nameAffected service names
You can also configure severity mapping to translate your platform’s severity values (e.g., warningmedium, P1critical) to CloudThinker’s severity levels.
Webhook configuration form showing field mapping with Title Path, Severity Path, Description Path, and Services Path JSONPath expressions

Configure JSONPath field mappings for your webhook payload

5

Configure Auto-Trigger Settings

Control how incidents trigger Root Cause Analysis:
  • Auto-trigger RCA: Automatically start AI investigation when an incident is created
  • Minimum severity: Only trigger RCA for incidents at this severity level or higher (default: Medium)
  • Send all fields to agent: Forward the complete webhook payload to the RCA agent for richer analysis
Root Cause Analysis configuration panel with Auto-trigger RCA toggle, Minimum Severity dropdown set to Medium

Configure automatic RCA triggering and severity thresholds

6

Copy Webhook URL & Authentication

The Setup tab displays your webhook URL and authentication details. Copy these credentials and configure them in your alerting platform.
Setup tab showing webhook URL, request format, HTTP headers, and code examples for webhook integration

Copy your webhook URL and authentication headers to configure in your alerting platform


Authentication Methods

CloudThinker supports four authentication methods to match your platform’s requirements. The correct method is pre-selected when you choose a platform, but you can change it for custom integrations.
MethodHow It WorksUsed By
Bearer TokenStandard token-based authentication via Authorization headerDatadog, Grafana, Prometheus, Splunk, GCP Monitoring, BigPanda
HMAC-SHA256Cryptographic signature verification — CloudThinker validates the request body signature using a shared secretPagerDuty, Sentry
API KeyCustom header with optional prefix (e.g., GenieKey, Api-Token)Opsgenie, New Relic, Dynatrace, ServiceNow
No AuthenticationFor platforms that verify identity through other mechanismsAWS CloudWatch (EventBridge), Azure Monitor
When you change the authentication method on an existing webhook, existing integrations using the previous method will immediately stop working. Regenerate credentials after changing auth methods.

Alert Correlation

When multiple alerts arrive within a short time window, CloudThinker can automatically correlate them into a single incident instead of creating duplicates. This reduces alert fatigue from cascading failures.

Time Window Correlation

Groups alerts received within a configurable window (default: 5 minutes). When a new alert matches an existing open incident, it’s attached as a correlated alert rather than creating a new incident.

Rule-Based Correlation

Define custom rules to match incoming alerts against existing incidents based on shared attributes. Rules are configured from the webhook card menu under Correlation Rules. Each rule specifies:
  • Conditions with AND/OR logic for matching
  • Priority (0-1000) to control evaluation order
  • Weight (0.0-1.0) to indicate match confidence
  • Minimum match weight threshold to accept a correlation
Available Operators:
OperatorDescription
equals / not_equalsExact match or mismatch
contains / not_containsSubstring match
starts_with / ends_withPrefix or suffix match
regexRegular expression match
in / not_inValue in or not in a list
intersectsArray overlap (e.g., shared tags)
existsField is present

Security & Limits

Payload Limits

LimitValue
Max HTTP body size1 MB
Max stored payload size100 KB
Max field length10,000 characters
Max array items100 elements
Max nesting depth10 levels

Rate Limiting

LimitValue
Default rate limit100 requests per hour per webhook
Auth failure limit10 failures per 15-minute window
Exceeded responseHTTP 429
Rate limits are configurable per webhook. Set to 0 for unlimited.

Security Features

  • Timing-safe signature verification prevents timing attacks on HMAC validation
  • Encrypted secret storage — webhook secrets are encrypted at rest
  • Credential rotation — regenerate webhook tokens and secrets without recreating the webhook
  • Payload sanitization — oversized fields are automatically truncated
  • Sensitive header filtering — authentication headers are excluded from audit logs