Delete a specific alert source by id
curl --request DELETE \
--url https://api.rootly.com/v1/alert_sources/{id} \
--header 'Authorization: Bearer <token>'{
"data": {
"id": "9b6387db-6380-4d7a-821a-bf35ceb99c82",
"type": "alert_sources",
"attributes": {
"name": "Alert Source 21",
"source_type": "datadog",
"status": "setup_incomplete",
"secret": "be07ccb43f01871817a662d75444cb68c25ecf6f0c3c92e074fe3bc75e91037f",
"alert_urgency_id": "6a2c2f0a-f157-438d-8ecc-3349d1b3206f",
"created_at": "2025-12-07T23:21:01.411-08:00",
"updated_at": "2025-12-07T23:21:03.706-08:00",
"webhook_endpoint": "http://localhost:3001/webhooks/incoming/datadog_webhooks/notify/<TYPE>/<ID>",
"owner_group_ids": [],
"alert_source_urgency_rules_attributes": [],
"alert_source_fields_attributes": [],
"sourceable_attributes": null,
"alert_template_attributes": null,
"resolution_rule_attributes": null
},
"relationships": {
"alert_source_urgency_rules": {
"data": []
},
"alert_source_fields": {
"data": []
}
}
}
}Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
alert source deleted
Show child attributes
Unique ID of the alert source
alert_sources Show child attributes
The name of the alert source
The status of the alert source
connected, setup_complete, setup_incomplete The secret used to authenticate non-email alert sources
Date of creation
Date of last update
The alert source type
email, app_dynamics, catchpoint, datadog, alertmanager, google_cloud, grafana, sentry, generic_webhook, cloud_watch, checkly, azure, new_relic, splunk, chronosphere, app_optics, bug_snag, honeycomb, monte_carlo, nagios, prtg ID for the default alert urgency assigned to this alert source
Toggle alert deduplication using deduplication key. If enabled, deduplication_key_kind and deduplication_key_path are required.
Kind of deduplication key.
payload Path to deduplication key. This is a JSON Path to extract the deduplication key from the request body.
Regular expression to extract key from value found at key path.
List of team IDs that will own the alert source
List of rules that define the conditions under which the alert urgency will be set automatically based on the alert payload
Show child attributes
JSON path expression to extract a specific value from the alert's payload for evaluation
Comparison operator used to evaluate the extracted value against the specified condition
is, is_not, contains, does_not_contain Value that the extracted payload data is compared to using the specified operator to determine a match
The type of the conditionable
AlertField The ID of the conditionable. If conditionable_type is AlertField, this is the ID of the alert field.
The kind of the conditionable
payload, alert_field The ID of the alert urgency
Provide additional attributes for generic_webhook alerts source
Show child attributes
Set this to true to auto-resolve alerts based on field_mappings_attributes conditions
This value is matched with the value extracted from alerts payload using JSON path in field_mappings_attributes
Set this to false to reject threaded emails
Specify rules to auto resolve alerts
Show child attributes
Select the field on which the condition to be evaluated
external_id, state, alert_title, alert_description, alert_external_url, notification_target_type, notification_target_id JSON path expression to extract a specific value from the alert's payload for evaluation
Provide additional attributes for email alerts source
Show child attributes
Set this to true to enable the auto resolution rule
The type of condition to evaluate to apply auto resolution rule
all, any The type of the identifier matchable
AlertField The ID of the identifier matchable. If identifier_matchable_type is AlertField, this is the ID of the alert field.
The kind of the identifier reference
payload, alert_field JSON path expression to extract unique alert identifier used to match triggered alerts with resolving alerts
Regex group to further specify the part of the string used as a unique identifier
List of conditions to evaluate for auto resolution
Show child attributes
JSON path expression to extract a specific value from the alert's payload for evaluation
Comparison operator used to evaluate the extracted value against the specified condition
is, is_not, contains, does_not_contain, starts_with, ends_with Value that the extracted payload data is compared to using the specified operator to determine a match
The type of the conditionable
AlertField The ID of the conditionable. If conditionable_type is AlertField, this is the ID of the alert field.
The kind of the conditionable
payload, alert_field List of alert fields to be added to the alert source
The email generated for email alert sources
The webhook URL generated for non-email alert sources
Was this page helpful?
curl --request DELETE \
--url https://api.rootly.com/v1/alert_sources/{id} \
--header 'Authorization: Bearer <token>'{
"data": {
"id": "9b6387db-6380-4d7a-821a-bf35ceb99c82",
"type": "alert_sources",
"attributes": {
"name": "Alert Source 21",
"source_type": "datadog",
"status": "setup_incomplete",
"secret": "be07ccb43f01871817a662d75444cb68c25ecf6f0c3c92e074fe3bc75e91037f",
"alert_urgency_id": "6a2c2f0a-f157-438d-8ecc-3349d1b3206f",
"created_at": "2025-12-07T23:21:01.411-08:00",
"updated_at": "2025-12-07T23:21:03.706-08:00",
"webhook_endpoint": "http://localhost:3001/webhooks/incoming/datadog_webhooks/notify/<TYPE>/<ID>",
"owner_group_ids": [],
"alert_source_urgency_rules_attributes": [],
"alert_source_fields_attributes": [],
"sourceable_attributes": null,
"alert_template_attributes": null,
"resolution_rule_attributes": null
},
"relationships": {
"alert_source_urgency_rules": {
"data": []
},
"alert_source_fields": {
"data": []
}
}
}
}