Cron + curl
A bash cron checks an internal endpoint and POSTs to WardenPoint when it fails. Five lines of bash, zero dependencies.
If your service can POST JSON, WardenPoint can escalate it. Internal scripts, GitHub Actions, schedulers, IoT devices, in-house tools — same contract, same audit trail.
Anatomy of a custom alert
LIVESetup
No integration UI to learn. Issue an API key, set a header, post the JSON. Anything from a bash cron to a Go service uses the same contract.
Dashboard → Settings → API Keys → Create. Scope the key per integration so revoking is targeted.
$ Settings › API Keys › CreatePick a recipient or recipient group UUID from the dashboard. The UUID is your routing target.
$ Recipients › copy UUIDSend POST /api/v1/notifications/send with X-API-Key, recipient_uuid, message and priority. That is the full contract.
$ curl -X POST .../notifications/sendWire format
Four required fields, one optional source label. Whatever you send appears in the audit log with the same shape as every other integration.
Routing recipes
Cron jobs, CI runners and internal services all share the same three needs.
A bash cron checks an internal endpoint and POSTs to WardenPoint when it fails. Five lines of bash, zero dependencies.
Add a Step with if: failure() that posts a WardenPoint alert. Only failing pipelines page on-call.
Embed the call inside your service. Any custom anomaly (fraud, queue lag, balance threshold) can become a WardenPoint incident.
Webhooks FAQ
Issue an API key, copy the curl snippet, swap your recipient UUID and run it. The audit log lights up immediately.