New Relic Integration
New Relic is a full-stack observability platform that helps you monitor application performance, infrastructure health, browser experience, and more. It provides real-time insights with customizable alerting through its Alerts & AI system.
Overview
This guide walks you through integrating New Relic with our alert management platform. New Relic delivers alert notifications through its Workflow system: when an alert condition is violated, New Relic creates an Issue, and the configured Workflow sends a webhook payload to our platform. When the issue is closed (manually or automatically), a separate CLOSED payload is sent for recovery.
Integration Flow
New Relic monitors your infrastructure, applications, and services through installed agents and integrations.
When a metric violates a configured Alert Condition threshold, New Relic opens an Incident and groups it into an Issue.
The Workflow evaluates its filter criteria and sends an HTTP POST webhook payload to the configured Destination (our platform endpoint).
When the issue is resolved or manually closed, the Workflow sends a CLOSED payload to the same endpoint for recovery.
Webhook Payload Schema
New Relic sends a customizable JSON payload via Workflows. The default payload template includes the following fields:
id
string
Yes
Unique identifier for the issue
issueUrl
string
Yes
Direct link to the issue in New Relic
title
string
Yes
Human-readable description of the alert condition violation
priority
string
Yes
Issue priority: CRITICAL, HIGH, MEDIUM, LOW, WARNING
impactedEntities
array
Yes
List of affected entity names (e.g., hostname)
totalIncidents
number
Yes
Number of incidents grouped into this issue
state
string
Yes
Issue state: CREATED, ACTIVATED, ACKNOWLEDGED, CLOSED
trigger
string
Yes
What triggered this notification: INCIDENT_ADDED, USER_ACTION
isCorrelated
boolean
No
Whether the issue was correlated with other issues
createdAt
number
Yes
Unix timestamp (ms) when the issue was created
updatedAt
number
Yes
Unix timestamp (ms) when the issue was last updated
sources
array
Yes
Source of the alert (e.g., ["newrelic"])
alertPolicyNames
array
Yes
List of alert policy names associated with this issue
alertConditionNames
array
Yes
List of alert condition names that triggered this issue
workflowName
string
Yes
Name of the workflow that sent this notification
State / Status Mapping
CREATED
PROBLEM
Issue just created, first incident added
ACTIVATED
PROBLEM
Issue is active with ongoing incidents
ACKNOWLEDGED
ACKNOWLEDGED
Issue has been acknowledged by a team member
CLOSED
RECOVERY
Issue resolved — either manually or automatically
Priority Mapping
CRITICAL
Critical
HIGH
High
MEDIUM
Medium
LOW
Low
WARNING
Warning
Alert Payload Examples
Raised (CREATED)
This payload is sent when a new issue is created from a threshold violation. The state field is CREATED and the trigger is INCIDENT_ADDED.

— CREATED payload received at webhook.site
Cleared (CLOSED)
This payload is sent when the issue is closed. The state field is CLOSED and the trigger indicates what caused the closure (e.g., USER_ACTION for manual close).

— CLOSED payload received at webhook.site
Installation & Configuration
Step 1: Create an Alert Source in the Platform
Log in to the alert management platform.
Navigate to Integrations → Add Integration.
Select New Relic as the provider.
Name the integration (e.g.,
Production New Relic Alerts).Save and copy the generated Webhook URL and Token.
Step 2: Create a Webhook Destination in New Relic
Log in to your New Relic account.
Navigate to Alerts → Destinations (under ENRICH & NOTIFY in the left sidebar).

— Destinations page (empty, showing available destination types)
Click on Webhook from the "Add a destination" section.
Configure the webhook destination:
Webhook name: Enter a descriptive name (e.g.,
OnCall Platform)Endpoint URL: Paste your platform webhook URL
Authorization: Select 'custom header' and fill the key blank with "x-itoc360-token" then paste your source token through value blank.
Click Save destination.

— Add destination form with webhook name and endpoint URL
The destination will now appear in the Destinations list.

— Destination created and visible in the list
Step 3: Install the New Relic Infrastructure Agent
To generate real metrics for alerting, install the New Relic Infrastructure Agent on your host.
Navigate to Integrations & Agents in the left sidebar.
Search for your operating system (e.g.,
macOS,Linux,Windows).

— Integrations & Agents search
Select your OS and follow the guided installation:
Step 1: Create or use an existing User Key.

— User key creation step
Step 2: Copy and run the install command on your host.

— Infrastructure agent install command
Step 3: Wait for the connection test to complete.

— Agent connected successfully
After installation, verify your host appears in All Entities with live metrics (CPU, Memory, Storage, Network).

— All Entities page showing the host with live metrics
Step 4: Create an Alert Condition
Navigate to Alerts → Alert Conditions or click Create alert condition.
Select Write your own query (NRQL mode).
Enter a NRQL query to monitor a metric. For example, to monitor CPU usage:

— NRQL query entered in the condition builder
Click Next to set thresholds.
Configure the condition threshold:
Threshold type: Static
Severity level: Critical
When a query returns a value: above
1for at least1minute

— Threshold configuration (Static, Critical, above 1 for 1 minute)
Click Next to add details.
Configure the condition details:
Name your alert condition:
High CPU UsagePolicy name:
Test Infrastructure Policy(or create a new policy)Group incidents into issues: Select One issue per condition

— Add details page with condition name and policy
Click Save & set up notifications.
Step 5: Create a Workflow
Navigate to Alerts → Workflows (under ENRICH & NOTIFY).

— Workflows page
Click Create your first workflow (or Add a workflow if you already have one).
Configure the workflow filter:
Policy: Select
Test Infrastructure PolicyVerify the filter shows "Filter is valid!"

— Workflow filter configuration with policy selected
Under Notify, click Webhook to add a notification channel.
Select the destination you created in Step 2 (e.g.,
OnCall Platform).Configure the payload template. The default template includes all necessary fields.

— Payload template editor with preview showing real data
Click Update message to save the payload template.
Back on the workflow page, verify the Webhook channel shows All updates (this ensures both CREATED and CLOSED notifications are sent).

— Workflow with Webhook channel configured, showing "All updates"
Important: The channel must be set to All updates to receive CLOSED (recovery) notifications. Without this, only trigger notifications will be sent.
Click Activate workflow.
Testing
Verify Alert Trigger (CREATED)
Once the alert condition is active, it will automatically trigger when the threshold is breached. You can verify the notifications in two places:
Issue Notifications Log: Navigate to Workflows → Issue Notifications Log tab to see sent notifications.

— Issue Notifications Log showing sent notifications
webhook.site: Check the received payload with
state: "CREATED"andtrigger: "INCIDENT_ADDED".

— CREATED payload at webhook.site with full JSON body
Verify Active Issue
Navigate to Alerts → Issues & Activity to see the active issue with its priority, duration, and entity name.

— Issues & Activity showing Active issue (Critical priority)
Verify Recovery (CLOSED)
To test the recovery flow:
Go to Issues & Activity.
Select the active issue (checkbox).
Click Close issues.
Check webhook.site for the CLOSED payload with
state: "CLOSED"andtrigger: "USER_ACTION".

— CLOSED payload at webhook.site
Verification Checklist
Verify that:
A CREATED notification is received by the platform (status: PROBLEM).
The payload contains the correct
alertPolicyNames,alertConditionNames, andpriority.A CLOSED notification is received after closing the issue (status: RECOVERY).
The
idfield matches between CREATED and CLOSED payloads for proper correlation.
Troubleshooting
No alerts received
Workflow not activated
Ensure the workflow status is Active in the Workflows page
No alerts received
Workflow filter doesn't match
Verify the Policy filter matches your alert policy name exactly
Recovery alerts missing
Channel not set to "All updates"
Edit the webhook channel in the workflow and ensure notification preference includes closed
Payload format unexpected
Custom payload template modified
Revert to the default payload template or verify all required fields are present
Authentication error (401/403)
Incorrect webhook URL or token
Verify the endpoint URL and authentication token in the Destination settings
Delayed notifications
Evaluation delay or aggregation window too long
Reduce the Window duration and Delay values in the alert condition's signal settings
"Failed" in Notifications Log
Destination endpoint unreachable
Check the endpoint URL is accessible and responding with 2xx status codes
Duplicate notifications
Multiple workflows matching the same policy
Review Workflows and remove duplicates
Last updated
Was this helpful?

