Integrations
Connect Relay to your existing tools for alerting, monitoring, and automation.
Available Integrations
| Integration | Use Case |
|---|---|
| Slack | Alert notifications, incident updates |
| PagerDuty | Escalation for critical alerts |
| Datadog | Forward events and metrics |
| GitHub | Secret scanning, deployment events |
| Linear | Auto-create tickets from alerts |
| Jira | Auto-create issues from incidents |
| Twilio | SMS alerts for critical events |
| OpsGenie | Alert management and on-call |
| Discord | Team notifications |
| Custom Webhook | Any HTTP endpoint |
Setting Up an Integration
- Go to Organization Settings → Integrations
- Click Add Integration and choose the type
- Configure the connection details
- Select which events to forward
- Enable and save
Slack Integration
Connect to a Slack workspace via an incoming webhook URL.
Configuration:
webhook_url— Your Slack incoming webhook URLchannel— Override the default channel (optional)
Events are formatted with:
- Severity emoji (rotating light, warning, info)
- Bold severity label
- Contextual fields as attachments
PagerDuty Integration
Create PagerDuty incidents automatically from Relay anomaly alerts.
Configuration:
integration_key— Your PagerDuty Events API v2 integration key
Severity mapping:
- Critical → PagerDuty
critical - High → PagerDuty
error - Medium → PagerDuty
warning - Low → PagerDuty
info
Datadog Integration
Forward events and metrics to Datadog for unified monitoring.
Configuration:
api_key— Your Datadog API keyapp_key— Your Datadog application key (optional)
Events appear as Datadog events with:
source_type_name: relay-cloud- Tags:
service:relay-cloud,severity:{level}
Custom Webhook Integration
Forward events to any HTTP endpoint. Payloads are HMAC-SHA256 signed.
Configuration:
url— Your endpoint URLsecret— Used to sign payloads
Payload:
{
"message": "Anomaly detected: connections spike",
"severity": "high",
"context": {
"app": "my-app",
"metric": "connections",
"value": 5420
},
"timestamp": 1712300000
}
Verify with:
X-Relay-Signature: hmac_sha256(json_body, secret)
SIEM Integration
Export audit logs to security information and event management systems:
| Destination | Format |
|---|---|
| Splunk HEC | JSON, CEF |
| Datadog Logs | JSON |
| Elasticsearch | JSON (bulk API) |
| Syslog | RFC 5424 |
| AWS S3 | JSON files |
| Custom Webhook | JSON, CEF, LEEF |
Configure in Organization Settings → SIEM Integration.
Notification Preferences
Each team member can configure their own notification routing:
- Email — Default for all alerts
- Slack — Real-time channel notifications
- PagerDuty — On-call escalation
- SMS — Emergency notifications via Twilio
Filter by severity: only receive critical and high alerts, for example.
Configure in Profile → Notification Preferences.