Overview
Incident.io integration enables IncidentFox to:- Automatically investigate when incidents are created
- Post findings to incident channels
- Enrich incident timelines with investigation data
- Correlate incidents with recent changes
- Access incident history and context
Prerequisites
- Incident.io account with API access
- API key with read permissions
- Slack integration configured (for responses)
Configuration
Step 1: Create an Incident.io API Key
- Go to your incident.io home dashboard
- Click the settings gear icon at the bottom of the left navbar (next to your name)
- Scroll down to the Extend section and click API keys
- Click Add New (top right)
- Click View data… (the first permission option)
- Name your API key appropriately, scroll down, and click Create
- Copy the API key
Step 2: Connect to IncidentFox
- Open the IncidentFox app in Slack (click the bot’s avatar → Open App)
- Under Available Integrations, find Incident.io and click Connect (or Edit if already configured)
- In the modal:
- Watch the video walkthrough for step-by-step guidance
- Paste your API Key
- Optionally, add Custom Context to help the AI understand your incident.io setup (e.g., team structure, service names, escalation patterns)
- Click Save
Custom Context for AI (Optional)
The Context for AI field lets you provide additional information that helps IncidentFox investigate more effectively. Examples:- “Our critical services are
payments-api,checkout-service, anduser-auth” - “High severity incidents automatically page the SRE on-call team”
- “We use incident.io custom fields for service ownership and deployment tracking”
Available Tools
Once configured, these tools become available:get_incident_details
Retrieve detailed information about a specific incident.
incident_id- Incident identifierinclude_timeline- Include timeline events (optional)
list_recent_incidents
Get a list of recent incidents with filtering options.
service- Filter by service (optional)severity- Filter by severity (optional)status- Active, resolved, alltime_range- Time range to search
correlate_incidents
Find similar or related incidents based on services, error patterns, or timing.
incident_id- Reference incidentsimilarity_threshold- Match confidence leveltime_range- How far back to search
How It Works
- Incident created in Incident.io
- IncidentFox queries incident details via API
- Investigation starts with incident context
- Findings posted to incident Slack channel
- Timeline optionally updated with investigation summary
Automatic Investigation
When an incident is created, IncidentFox:- Extracts context from incident title and description
- Identifies services mentioned in the incident
- Queries data sources for relevant logs/metrics
- Correlates with changes in the last 4 hours
- Posts findings to the incident channel
Example
Incident created:Timeline Integration
IncidentFox can automatically add entries to your Incident.io timeline during investigations:- Investigation started - When IncidentFox begins analyzing an incident
- Root cause identified - When high-confidence findings are detected
- Investigation complete - Final summary with recommendations
Severity Mapping
| Incident.io Severity | IncidentFox Priority |
|---|---|
| Critical | P0 |
| High | P1 |
| Medium | P2 |
| Low | P3 |
Use Cases
Historical Context During Incidents
- Search incident history for similar patterns
- Identify common root causes
- Reference previous resolutions
Post-Incident Analysis
Incident Correlation
Best Practices
- Use consistent service naming across incident.io and your infrastructure
- Tag incidents properly for better correlation
- Add PagerDuty context when creating incidents
- Use structured descriptions for better parsing
- Review similar incidents before diving into investigation
Security Considerations
What IncidentFox Can Access
The API key with “View data” permissions grants these read-only capabilities:| Permission | Purpose |
|---|---|
| View incidents | Access incident details and history |
| View timelines | Read incident timeline events |
| View custom fields | Access service metadata |
| View users and teams | Understand on-call assignments |
What IncidentFox Cannot Do
- Create, modify, or delete incidents
- Change incident status or severity
- Update postmortems or retrospectives
- Manage API keys or users
- Access or modify workflows
- Change team settings
Best Practices
- All permissions are read-only - no write or management access
- You control the key - revoke anytime from your incident.io dashboard
- No data storage - IncidentFox queries on-demand; data stays in incident.io
- Store keys in your secrets manager
- Rotate keys periodically
- Monitor API usage for anomalies
Revoking Access
To revoke IncidentFox’s access at any time:- Go to your incident.io home dashboard
- Click the settings gear icon at the bottom of the left navbar
- Navigate to Extend > API keys
- Find the IncidentFox key and click Delete
Troubleshooting
Connection Failed
Symptom: “Unable to connect to Incident.io API” Solutions:- Verify API key is valid and not expired
- Check that “View data” permission was granted
- Ensure network allows outbound HTTPS to incident.io
Missing Incident Data
Symptom: IncidentFox can’t find incidents Solutions:- Verify incident IDs are correct
- Check time range - incidents may be outside the range
- Ensure service names match those used in incident.io
Rate Limiting
Symptom: “Rate limit exceeded” errors Solutions:- Reduce query frequency
- Use more specific filters (service, severity, time range)
- Contact incident.io support to increase limits
Next Steps
PagerDuty
Connect PagerDuty
Slack
Configure Slack responses

