New Relic connector
Automate Observability Workflows with New Relic Integrations
Connect New Relic to your tech stack to route alerts, sync incident data, and build DevOps automation pipelines.

What can you do with the New Relic connector?
New Relic gives you real-time performance monitoring, distributed tracing, and alerting across your application stack. But that telemetry data only gets useful when it reaches your incident management, collaboration, and BI tools. With tray.ai, teams can automate the full incident lifecycle — from a New Relic alert firing through to resolution, retrospective, and reporting — without writing custom glue code.
Automate & integrate New Relic
Automating New Relic business process or integrating New Relic data is made easy with tray.ai
Use case
Automated Incident Response and Escalation
When New Relic detects an anomaly or breaches an alert threshold, tray.ai can instantly create incidents in PagerDuty or Opsgenie, post notifications in Slack, and open tickets in Jira — all in parallel. That eliminates the manual triage step that costs precious minutes during outages and ensures no critical alert gets missed.
Use case
Bi-Directional Incident Sync Across Tools
Engineering teams often manage incidents simultaneously in New Relic, ServiceNow, and Jira, which leads to fragmented status updates. tray.ai keeps incident state in sync across platforms — when a ServiceNow ticket is resolved, the corresponding New Relic alert policy acknowledgment updates automatically, and vice versa.
Use case
SLO and Error Budget Reporting to Business Stakeholders
New Relic tracks SLOs and error budgets, but getting that data to non-technical stakeholders usually means manual exports and spreadsheet work. tray.ai can pull SLO compliance data from New Relic's NerdGraph API on a schedule and push formatted summaries into Google Sheets, Confluence, or Tableau dashboards.
Use case
Deployment Marker and Change Tracking Automation
Correlating deploy events with New Relic APM data is how you understand what a release actually did to performance. tray.ai can automatically post deployment markers to New Relic whenever a CI/CD pipeline in GitHub Actions, CircleCI, or Jenkins completes, giving you instant correlation between releases and performance regressions.
Use case
AI Agent-Driven Root Cause Analysis Assistance
Build AI agents on tray.ai that query New Relic's NerdGraph API to gather APM traces, infrastructure metrics, and log data when an incident fires, then pass that context to an LLM like OpenAI to generate a preliminary root cause analysis summary. On-call engineers get a head start before they even open their laptops.
Use case
Customer-Impacting Incident Communication
When New Relic identifies a customer-facing service degradation, tray.ai can automatically trigger status page updates in Statuspage.io or Atlassian Status Page, and send proactive email or SMS notifications to affected customer segments from your CRM. Support ticket volume stays down and customers stay informed.
Use case
Security and Compliance Alert Routing
New Relic's security monitoring and infrastructure alerting can detect anomalous traffic patterns, unauthorized access attempts, or compliance violations. tray.ai routes these alert types to your SIEM, security Slack channels, or compliance tracking systems in real time, keeping security and engineering workflows cleanly separated.
Build New Relic Agents
Give agents secure and governed access to New Relic through Agent Builder and Agent Gateway for MCP.
Data Source
Query Application Performance Metrics
Retrieve real-time and historical performance data — response times, throughput, error rates — for monitored applications. An agent can use this to spot bottlenecks or generate health summaries.
Data Source
Fetch Alert Violations and Incidents
Pull active or historical alert violations and incidents from New Relic to give an agent situational awareness during an outage. This enables automated triage by surfacing which thresholds have been breached and for how long.
Data Source
Retrieve Infrastructure Health Data
Access CPU, memory, disk, and network metrics for monitored hosts and containers. An agent can use this to correlate infrastructure issues with application-level degradation.
Data Source
Run NRQL Queries
Execute custom NRQL queries against telemetry data to surface specific insights on demand. This gives an agent flexible, ad-hoc access to logs, traces, events, and metrics across any monitored service.
Data Source
Look Up Deployment Markers
Retrieve recorded deployments and change markers to correlate performance shifts with recent code releases. An agent can use this to automatically determine whether a new deployment caused a detected anomaly.
Data Source
Access Synthetic Monitor Results
Fetch results and failure details from New Relic Synthetic monitors that simulate user interactions. An agent can use this to flag external availability issues before real users are impacted.
Agent Tool
Create Alert Policies and Conditions
Programmatically define new alert policies and threshold conditions for monitored entities. An agent can use this to automatically set up monitoring when a new service is deployed or an on-call policy changes.
Agent Tool
Acknowledge or Close Incidents
Update the status of open incidents by acknowledging or resolving them directly within New Relic. This lets an agent coordinate incident response workflows and cut noise once a fix has been confirmed.
Agent Tool
Create Deployment Markers
Record deployment events against an application to mark when a new version was released. An agent can trigger this automatically as part of a CI/CD pipeline, making before-and-after performance comparisons straightforward.
Agent Tool
Mute Alert Conditions
Apply muting rules to suppress alerts during planned maintenance windows or known incidents. An agent can automate this to prevent alert fatigue when a scheduled downtime or controlled change is underway.
Agent Tool
Send Custom Events
Ingest custom event data into New Relic's telemetry pipeline to capture business or operational events that aren't natively tracked. An agent can use this to enrich observability data with context from external systems like CRMs or ticketing tools.
Agent Tool
Tag and Manage Monitored Entities
Add, update, or remove metadata tags on monitored services, hosts, and applications. An agent can keep entity metadata consistent across environments, making it easier to filter and query data by team, environment, or product area.
Get started with our New Relic connector today
If you would like to get started with the tray.ai New Relic connector today then speak to one of our team.
New Relic Challenges
What challenges are there when working with New Relic and how will using Tray.ai help?
Challenge
NerdGraph API Complexity and NRQL Query Building
New Relic's primary API is NerdGraph, a GraphQL API that requires teams to construct complex nested queries and understand NRQL syntax to extract meaningful data. For engineers who aren't GraphQL specialists, this creates a real learning curve that slows down integration work.
How Tray.ai Can Help:
tray.ai's New Relic connector abstracts common NerdGraph operations into pre-built actions, while the flexible HTTP client lets advanced teams execute raw NerdGraph queries with full variable support. Both low-code users and developers can work with New Relic data without becoming GraphQL experts.
Challenge
Alert Noise and Deduplication at Scale
High-traffic applications can generate hundreds of New Relic alerts per day, overwhelming on-call teams with redundant notifications across Slack, PagerDuty, and email. Without filtering and deduplication logic, engineers spend more time managing alerts than resolving incidents.
How Tray.ai Can Help:
tray.ai workflows can implement conditional logic to filter, deduplicate, and group New Relic alerts before routing them downstream. Teams can define rules based on alert severity, entity tags, time-of-day, or previous alert state to ensure only actionable notifications reach engineers.
Challenge
Connecting Observability Data to Business Context
New Relic captures deep technical telemetry, but mapping that data back to business impact — which customers are affected, what revenue is at risk, which SLAs are threatened — requires pulling data from CRMs, billing systems, and contract databases that New Relic doesn't connect to natively.
How Tray.ai Can Help:
tray.ai bridges New Relic and business systems like Salesforce, HubSpot, and Stripe. When a critical alert fires, workflows can automatically enrich the incident with customer impact data by joining New Relic service tags to customer account records in real time.
Challenge
Maintaining Audit Trails for Compliance and Post-Mortems
Regulated industries and mature engineering orgs need comprehensive audit trails of every alert, acknowledgment, escalation, and resolution. New Relic's native retention policies may not meet long-term compliance requirements, and manually exporting incident history is time-consuming.
How Tray.ai Can Help:
tray.ai can automatically stream every New Relic alert event to a data warehouse like Snowflake, BigQuery, or a Splunk index in real time, creating a durable and queryable incident history. This supports both compliance audits and data-driven post-mortem analysis without manual data exports.
Challenge
Multi-Account and Multi-Environment Alert Management
Large enterprises often run separate New Relic accounts for production, staging, and different business units, which makes it hard to get a unified view of system health and consistently apply alert routing logic across all environments.
How Tray.ai Can Help:
tray.ai supports multiple authenticated New Relic connections within a single workflow, so teams can build centralized alert routing pipelines that pull data from multiple accounts. Conditional branching logic ensures each alert is handled according to its originating environment and business unit without duplicating workflows.
Talk to our team to learn how to connect New Relic with your stack
Find the tray.ai connector with one of the 700+ other connectors in the tray.ai connector library to integrate your stack.
Integrate New Relic With Your Stack
The Tray.ai connector library can help you integrate New Relic with the rest of your stack. See what Tray.ai can help you integrate New Relic with.
Start using our pre-built New Relic templates today
Start from scratch or use one of our pre-built New Relic templates to quickly solve your most common use cases.
Template
New Relic Alert to PagerDuty Incident with Slack Notification
Automatically creates a PagerDuty incident and posts an enriched Slack message with service context whenever a New Relic critical alert fires, then closes the PagerDuty incident when the alert resolves.
Steps:
- Receive New Relic alert webhook payload including alert condition, entity name, and severity
- Create a new PagerDuty incident with full alert context and link to New Relic entity page
- Post a formatted Slack message to the relevant team channel with incident details and PagerDuty link
- Listen for New Relic alert resolved event and automatically acknowledge and resolve the PagerDuty incident
Connectors Used: New Relic, PagerDuty, Slack
Template
CI/CD Deployment Marker Sync to New Relic
Posts a deployment marker to New Relic APM automatically whenever a GitHub Actions workflow completes, tagging the deploy with commit SHA, author, and environment for instant performance correlation.
Steps:
- Trigger on GitHub Actions workflow_run completion event for production deployments
- Extract commit SHA, author email, repository name, and deployment environment from the GitHub payload
- Call New Relic NerdGraph API to record a deployment marker against the matching APM application entity
- Post a confirmation message to a Slack deployments channel with a direct link to the New Relic deploy view
Connectors Used: New Relic, GitHub
Template
Weekly SLO Compliance Report to Google Sheets
Queries New Relic NerdGraph on a weekly schedule to retrieve SLO compliance percentages and error budget remaining for all tracked services, then appends results to a Google Sheet for stakeholder reporting.
Steps:
- Trigger on a weekly schedule every Monday morning before standup
- Execute a NerdGraph NRQL query to retrieve SLO compliance and error budget burn rate for each service
- Append a new timestamped row to a Google Sheet tracking SLO performance over time
- Send a Gmail digest to engineering leadership and product managers with the week's SLO summary
Connectors Used: New Relic, Google Sheets, Gmail
Template
New Relic Alert to Jira Bug Ticket with Auto-Assignment
Creates a Jira bug ticket automatically when a New Relic alert fires, enriches it with APM data and a link to the relevant New Relic dashboard, and assigns it to the correct team based on the alert's service tag.
Steps:
- Receive New Relic alert webhook and parse service name, environment, and alert condition details
- Look up the Jira team assignment mapping based on the New Relic service entity tag
- Create a Jira bug with pre-populated description including NRQL query link, alert threshold, and current metric value
- Post a Slack notification to the assigned team channel linking to both the Jira ticket and New Relic alert
Connectors Used: New Relic, Jira, Slack
Template
New Relic Incident to Statuspage and Customer Email Notification
Detects customer-facing service degradations in New Relic and automatically creates a Statuspage incident while triggering a proactive email to affected customers sourced from a CRM segment.
Steps:
- Receive New Relic webhook for alerts tagged as customer-facing services
- Create a new incident on Statuspage with the appropriate affected component and impact level
- Query HubSpot for contacts with active subscriptions to the impacted service
- Send a proactive service disruption email via SendGrid and update Statuspage when the alert resolves
Connectors Used: New Relic, Statuspage, HubSpot, SendGrid
Template
AI-Powered On-Call Incident Brief Builder
When a critical New Relic alert fires, automatically queries related traces, error logs, and infrastructure metrics, then generates an AI-written incident summary and posts it to the incident Slack channel.
Steps:
- Trigger on New Relic critical alert webhook and extract the affected entity GUID and alert condition
- Execute multiple NerdGraph queries to collect recent error traces, top error messages, and infrastructure host metrics
- Pass the collected telemetry data to OpenAI with a prompt to generate a concise root cause hypothesis and recommended investigation steps
- Post the AI-generated incident brief to the Slack incident channel and attach it as a note on the PagerDuty incident
Connectors Used: New Relic, OpenAI, Slack, PagerDuty


