Skip to main content
WEBHOOK
anomaly-alert.created
{
  "id": "f3b9a1d2-5e5c-4a57-9f8f-2d1b98c0c3e0",
  "name": "BigQuery - Compute",
  "detectedAt": "2025-05-01T12:00:00Z",
  "expectedCost": 303,
  "actualCost": 456,
  "reportUrl": "https://app.pelanor.io/triggered-alerts/5dbd0048-4e85-425a-a1d0-11521e397e4b",
  "monitorUrl": "https://app.pelanor.io/monitors/c7d3f8e6-2b9d-4c51-bb82-4fb14b3a88cf",
  "aiSummary": "Analytics Team activity increased; main driver: threat_logs table."
}
Contact Pelanor Support to configure Anomaly Alert Webhook delivery URL for your account.

Body

application/json
id
string<uuid>
required

Unique identifier of the alert in Pelanor.

name
string
required

Human-readable name derived from the monitor aggregation key.

detectedAt
string<date-time>
required

UTC time when the alert was detected.

expectedCost
number
required

Expected cost (USD).

actualCost
number
required

Observed cost (USD) that triggered the alert.

reportUrl
string<uri>
required

Link to the alert investigation in Pelanor.

monitorUrl
string<uri>
required

Link to the Anomaly Monitor configuration.

aiSummary
string

AI-generated summary with context and likely root cause.

Response

200

Return a 2xx status to acknowledge receipt.