This guide walks you through setting up a Clarion Generic Webhook monitor — a flexible endpoint that accepts JSON events from any service that can make an HTTP POST request. Use it to bring custom alerts, deploy events, CI failures, or any JSON payload into Clarion.Documentation Index
Fetch the complete documentation index at: https://docs.clarion.cantina.xyz/llms.txt
Use this file to discover all available pages before exploring further.
Estimated time: 5 minutes. You will need a Clarion workspace and the ability to configure outbound webhooks in the source service.
Prerequisites
- A Clarion workspace
- A service that can send HTTP
POSTrequests with a JSON body (CI systems, bespoke scripts, SaaS tools with webhook outputs, Slack-style senders, etc.)
Step 1 — Create a Generic Webhook monitor
- In Clarion, go to Settings > Integrations
- Find Webhook and click Add Monitor
- Give the monitor a name — it is prefixed onto alert titles, so different monitors are easy to tell apart
- Pick an authentication method (see the next section)
- Pick a default severity for alerts created by the monitor
- Click Create
Step 2 — Choose an authentication method
| Mode | How requests are authenticated | When to use |
|---|---|---|
| HMAC-SHA256 signature | Sender signs the raw request body with the shared secret and sends the hex digest in X-Webhook-Signature (also accepts X-Hub-Signature-256 with the sha256= prefix) | Production senders that can compute HMAC |
| Bearer token | Sender includes Authorization: Bearer <token> | Services with a simple token field in their webhook config |
| No authentication | Any request is accepted | Trusted internal networks only |
Step 3 — Send events from your service
Point the source service at the webhook URL Clarion gave you. UsePOST with a JSON object body, up to 100 KB.
Minimal example
What goes in the payload
Any valid JSON object is accepted. Clarion looks at the payload’stype, event, eventType, or event_type field (in that order) to derive an event type — used for matching filters and included in the alert title. If none of those fields is present, the event is treated as generic.
Fields used by the default alert template:
| Field | How it’s used |
|---|---|
type / event / eventType / event_type | Event type — filter matching and alert title |
message | Included as the body of the alert description |
severity | Shown under “Reported severity” in the description |
source | Shown under “Source” in the description |
Optional headers
| Header | Purpose |
|---|---|
X-Webhook-Signature or X-Hub-Signature-256 | HMAC-SHA256 hex digest of the body (required when the monitor uses HMAC auth) |
Authorization: Bearer <token> | Required when the monitor uses Bearer auth |
X-Idempotency-Key or X-Request-Id | If present, retries of the same value are treated as duplicates and will not create a second alert |
The default “All webhook events” filter
When you create the monitor, Clarion adds an All webhook events filter that creates an alert for every incoming event with the default severity you chose. From the monitor’s Configure page you can:- Change the default severity — it applies to the default filter immediately
- Disable the default filter if you only want alerts for specific events
- Add more filters that match by event type, payload fields, or conditions (e.g. only alert when
severity = critical)
message, severity, source) alongside the event type.
Using as a Slack replacement
Many services offer a “Slack incoming webhook URL” field for sending notifications. Because the Generic Webhook accepts arbitrary JSON, you can drop the Clarion webhook URL into those fields instead — your notifications become Clarion alerts that get triaged by AI agents. To set this up:- Create a Generic Webhook monitor with No authentication (most Slack-style senders don’t sign requests) or Bearer token if the source service lets you add an
Authorizationheader - Copy the webhook URL from the monitor
- In the source service, paste the Clarion webhook URL wherever it asks for a Slack webhook URL
- Send a test notification — it will appear as an alert in Clarion
What happens next
Once configured, Clarion will automatically:- Accept JSON events at the monitor’s webhook URL
- Apply the default All webhook events filter (and any custom filters you add) to create alerts
- Triage incoming alerts using AI agents and surface actionable insights