Overview
Integrations connect Easyalert to your monitoring and observability tools. When an alert fires in your monitoring system, it’s sent to Easyalert via webhook, automatically creating an incident and triggering the appropriate escalation policy.Automatic Detection
Easyalert automatically detects the source type and extracts relevant fields
Custom Mapping
Map severity levels and enrich alerts with additional context
Real-Time Processing
Alerts are processed instantly and trigger escalations immediately
Sample Analysis
View and analyze incoming webhooks to fine-tune your configuration
Supported Integrations
Easyalert supports the following monitoring tools out of the box:Zabbix
Open-source enterprise monitoring
Prometheus
Cloud-native monitoring with Alertmanager
Grafana
Unified alerting and legacy alerts
Datadog
Cloud-scale monitoring and security
Dynatrace
AI-powered observability platform
AppDynamics
Business and application performance
New Relic
Full-stack observability platform
Custom Webhook
Any tool that can send HTTP webhooks
How Integrations Work
Create Integration in Easyalert
Add a new integration and select the source type (Zabbix, Prometheus,
Grafana, Datadog, or Custom)
Configure Your Monitoring Tool
Set up your monitoring tool to send alerts to the webhook URL (webhook,
notification channel, or media type depending on tool)
Creating an Integration
Select Source Type
Choose the Source Type that matches your monitoring tool (Zabbix,
Prometheus, Grafana, Datadog, or Custom)
Enter Details
- Name — Descriptive name (e.g., “Production Prometheus”, “Zabbix DC1”)
- Description — Optional explanation
Each integration gets a unique webhook URL. Keep this URL secure as anyone
with access can send alerts to your account.
Webhook URL Structure
Your webhook URL follows this format:
Example: https://api.easyalert.io/api/v1/webhooks/ingest/wh_abc123...
The token is a unique identifier for your integration. If compromised, you can regenerate it from the integration settings.
Viewing Integrations
The Integrations page shows all your configured integrations:| Column | Description |
|---|---|
| Name | Integration name and description |
| Type | Source type badge (Zabbix, Prometheus, etc.) |
| Events | Total number of events received |
| Last Event | When the last event was received |
| Status | Active or Inactive |
| Actions | View URL, configure, edit, delete |
Integration Statistics
Each integration tracks:- Event Count — Total alerts received
- Last Event — Timestamp of most recent alert
- Last Error — Most recent processing error (if any)
- Consecutive Errors — Count of sequential failures
Managing Integrations
View Webhook URL
- Click the three-dot menu (⋮)
- Select View Webhook URL
- Copy the URL to your clipboard
Regenerate Token
If your webhook URL is compromised:- Click the three-dot menu
- Select Regenerate Token
- Confirm the action
Activate/Deactivate
Toggle integration status without deleting:- Click the three-dot menu
- Select Activate or Deactivate
Delete Integration
- Click the three-dot menu
- Select Delete
- Confirm deletion
Configuring Severity Mapping
Map source severity values to Easyalert’s standard levels.Standard Severity Levels
| Level | Description | Color |
|---|---|---|
| Critical | Requires immediate attention, service down | Red |
| High | Serious issue, significant degradation | Orange |
| Warning | Potential issue, investigate | Yellow |
| Info | Informational alert, low impact | Blue |
| OK | Recovery/resolved state | Green |
Easyalert automatically maps common severity values from monitoring tools. See
individual integration guides for specific mappings.
Setting Up Mappings
Add Mappings
Map each source value to a standard severity: - “P1” → Critical - “P2” →
High - “P3” → Warning
Example: Datadog Priority Mapping
Example: Datadog Priority Mapping
Configuring Enrichment
Add static metadata to all alerts from an integration.Use Cases
- Add environment tags (production, staging, dev)
- Identify the team responsible
- Add region or datacenter information
- Tag for routing rules
Adding Enrichment
Example: Production Environment Enrichment
Example: Production Environment Enrichment
Tag-Based Routing
All integrations support tag-based routing for escalation policies and notification rules.How Tags Work
- From Source: Tags come from your monitoring tool (Zabbix host tags, Prometheus labels, Datadog tags, etc.)
- From Enrichment: Static tags added via integration configuration
- From Payload: Custom fields in the webhook payload automatically become tags
Routing Examples
Escalation Routing:See individual integration guides for specific tag configuration instructions.
Webhook Samples
Easyalert stores samples of incoming webhooks for debugging and configuration.Viewing Samples
- Navigate to Configuration → Webhook Samples
- Filter by integration
- View raw and transformed payloads
Sample Analysis
The analysis feature helps you understand:- Which fields are present in your alerts
- Common values for key fields
- How to configure severity mappings
Auto-Detection
Easyalert automatically detects the source type based on payload characteristics:| Source | Detection Signals |
|---|---|
| Zabbix | event_id, trigger_name, trigger_severity |
| Prometheus | alerts array, status: firing/resolved |
| Grafana | ruleId, orgId, dashboardURL |
| Datadog | alert_id, datadoghq.com in URLs |
| Dynatrace | PID, ProblemID, State: OPEN/RESOLVED |
| AppDynamics | event_type: POLICY_*, health_rule_name |
| New Relic | issueId, newrelic.com in URLs |
Alert Processing Pipeline
Best Practices
Use Descriptive Names
Use Descriptive Names
Name integrations clearly: “Production Prometheus - EU”, “Staging Datadog”
Test Before Production
Test Before Production
Send test alerts to verify configuration before relying on the integration
Configure Severity Mapping
Configure Severity Mapping
Map severities to ensure proper prioritization of incidents
Add Enrichment for Routing
Add Enrichment for Routing
Use enrichment to add tags that routing rules can match against
Monitor Integration Health
Monitor Integration Health
Check event counts and error statistics regularly
Secure Webhook URLs
Secure Webhook URLs
Treat webhook URLs like passwords—don’t commit them to public repositories
Troubleshooting
Alerts not appearing
Alerts not appearing
- Verify the integration is Active 2. Check the webhook URL is correct in your monitoring tool 3. Look for errors in the integration statistics 4. Verify your monitoring tool can reach the webhook URL
Wrong severity assigned
Wrong severity assigned
- Check severity mapping configuration 2. Verify the source field name matches your payload 3. View webhook samples to see actual field values 4. Set appropriate default severity
Duplicate incidents
Duplicate incidents
- Verify your monitoring tool sends unique event IDs 2. Check deduplication settings 3. Review the event ID field mapping
Integration showing errors
Integration showing errors
- Check the last error message 2. Verify payload format matches expected structure 3. Look at webhook samples for malformed data 4. Regenerate token if authentication issues
Rate Limits
| Limit | Value |
|---|---|
| Requests per minute | 1,000 per webhook |
| Payload size | 1 MB maximum |