Step 1: Create an incoming webhook in Slack
Open the Slack app directory
Go to your workspace’s Slack app directory and create a new app, or select an existing one you manage.
Enable incoming webhooks
In the app settings, go to Features → Incoming Webhooks and toggle the feature on.
Add a webhook to your workspace
Click Add New Webhook to Workspace and pick the channel where alerts should appear (for example,
#infraudit-alerts).Step 2: Configure InfraAudit
- SaaS
- Self-hosted
Test the integration
After saving, send a test message to verify the connection:- UI
- CLI
Go to Settings → Notifications → Slack and click Send test message.
Configure alert routing
By default, all alert types and severities are sent to the channel you configured. To route different alert types to different channels, set up routing rules under Settings → Notifications → Routing. A typical routing setup:| Alert type | Channel |
|---|---|
| Critical security alerts | #security |
| Cost anomalies | #finops |
| Compliance failures | #compliance |
| All events | #infraudit-all |
What each Slack alert contains
Every message InfraAudit posts to Slack includes:- Alert title and type (security, cost, compliance)
- Severity badge
- Resource name and provider
- A short description of what was detected
- A direct link to the full alert in the InfraAudit UI