Skip to main content
WEBHOOK
anomaly-alert.created
{
  "id": "f3b9a1d2-5e5c-4a57-9f8f-2d1b98c0c3e0",
  "name": "BigQuery - Compute",
  "detectedAt": "2025-05-01T12:00:00Z",
  "expectedCost": 303,
  "actualCost": 456,
  "reportUrl": "https://app.pelanor.io/triggered-alerts/5dbd0048-4e85-425a-a1d0-11521e397e4b",
  "monitorUrl": "https://app.pelanor.io/monitors/c7d3f8e6-2b9d-4c51-bb82-4fb14b3a88cf",
  "aiSummary": "Analytics Team activity increased; main driver: threat_logs table."
}

Documentation Index

Fetch the complete documentation index at: https://docs.pelanor.io/llms.txt

Use this file to discover all available pages before exploring further.

Contact Pelanor Support to configure Anomaly Alert Webhook delivery URL for your account.

Authorizations

Authorization
string
header
required

Bearer authentication header of the form Bearer <token>, where <token> is your auth token.

Body

application/json
id
string<uuid>
required

Unique identifier of the alert in Pelanor.

name
string
required

Human-readable name derived from the monitor aggregation key.

detectedAt
string<date-time>
required

UTC time when the alert was detected.

expectedCost
number<double>
required

Expected cost (USD).

actualCost
number<double>
required

Observed cost (USD) that triggered the alert.

reportUrl
string<uri>
required

Link to the alert investigation in Pelanor.

monitorUrl
string<uri>
required

Link to the Anomaly Monitor configuration.

aiSummary
string

AI-generated summary with context and likely root cause.

Response

200

Return a 2xx status to acknowledge receipt.