Google Cloud Monitor Integration
Google Cloud Monitoring (formerly Stackdriver) lets you set up alerting policies on metrics and logs across your GCP infrastructure. When a condition is met, it fires a webhook notification to any endpoint you configure — including ITOC360.
This integration receives those webhook notifications and turns them into incidents in your on-call workflow. When the alert resolves in Google Cloud, the incident is automatically resolved in itoc360 as well.
How It Works
Google Cloud Monitoring sends a webhook payload to ITOC360 every time an alerting policy condition is triggered or resolved. The payload always contains an incident_id that stays the same for both the open and close events — ITOC360 uses this to match them together automatically.
When
stateisOPEN→ a new alert is created in ITOC360When
stateisCLOSED→ the existing alert is resolved
Prerequisites
A Google Cloud project with Cloud Monitoring enabled
An alerting policy (or you will create one during setup)
An ITOC360 source configured for Google Cloud Monitoring
Step 1 — Copy Your Webhook URL
In ITOC360, navigate to your source settings and copy the webhook URL generated for your Google Cloud Monitoring source. You will paste this into Google Cloud in the next step.
Step 2 — Add a Webhook Notification Channel
Open the Google Cloud Console and navigate to Monitoring from the left sidebar.On the Monitoring page, go to Alerting.

Click the "Edit Notification Channels" button in the top right corner of the Alerting page.

On the Notification Channels page, scroll down to the Webhooks section and click "Add New".
Fill in the form:
Display Name — enter a recognizable name, for example
itoc360Endpoint URL — paste the webhook URL you copied from ITOC360, then append your source token as a query parameter at the end
Google Cloud Monitoring does not support custom request headers, so the source token must be passed in the URL itself. The final URL should look like this:
You can find your source token on the source settings page in ITOC360.

Click "Test Connection" to verify that ITOC360 can receive the payload. You should see a success toast at the bottom of the page.
Click Save. The new webhook channel will now appear in the Webhooks list.

Step 3 — Attach the Webhook to an Alerting Policy
Go back to Monitoring > Alerting and open an existing alerting policy, or create a new one by clicking "Create Policy".

In the left sidebar, click "Notifications and name" to jump to the notifications step.
Click "Add Notification Channels".
A panel will open listing all available notification channels. Find the webhook you created under the Webhooks section and select it.

After selecting it, the channel will appear under the Notifications section of the policy.
Give the policy a name in the "Alert policy name" field at the bottom, then click "Create Policy" or "Save" if you are editing an existing one.
The policy will now appear in the Alerting list.
Payload Reference
Below is the payload structure that Google Cloud Monitoring sends to webhook. This is provided for reference — no manual configuration is needed.
When the alert resolves, the same payload is sent with state set to "CLOSED" and ended_at filled in. itoc360 matches it to the original alert using incident_id and closes the incident automatically.
Priority Mapping
itoc360 maps the severity field from the incoming payload to its own priority levels. The default mapping is shown below. You can override it per source from the source settings page.
CRITICAL
Critical
ERROR
High
WARNING
Medium
INFO
Low
no severity
Medium
Note: When an alerting policy does not have a severity level configured, Google Cloud sends
"no severity"as the value. ITOC360 treats this as Medium priority by default.
Troubleshooting
Test notification was sent but no event appeared in itoc360 Check that the endpoint URL is correct and that the token query parameter is present and matches your itoc360 source token. Google Cloud Monitoring does not support custom headers, so authentication must be done via the query parameter. Also make sure your itoc360 source is active.
Incidents are not resolving automatically This usually means the alerting policy is not configured to send a notification on resolution. In Google Cloud, make sure the "Notify on incident closure" option is enabled for the notification channel, or that your alerting policy has a closing condition defined.
severity field is missing from the payload Some alerting policies do not set a severity level. In that case, ITOC360 falls back to Medium priority. You can set a default priority override from the source settings if needed.
Last updated
Was this helpful?

