New Relic

Surface New Relic observability insights through AI-driven conversations

When customers report issues, your AI agent checks New Relic for application health, active alerts, and performance data in real time. Incidents get acknowledged faster, root causes surface sooner, and your operations team spends less time on status update requests.

Chosen by 800+ global brands across industries

Observability actions your agent performs live

From alert policy management to application health checks, your AI agent taps into New Relic's monitoring stack to answer performance questions during active conversations.

Create Alert Channels

Your team needs a new notification endpoint for critical incidents. The AI agent calls New Relic's Create Alert Channel API to register email, Slack, or webhook destinations, ensuring the right people get notified without manual configuration.

Manage Alert Policies

Someone asks about current monitoring rules. The agent retrieves all alert policies from New Relic, filters by name or incident preference, and presents the active policies so your team can verify coverage without logging into the dashboard.

Inspect Alert Conditions

A developer asks what triggers alerts for a specific policy. Your AI agent fetches the alert conditions tied to that policy ID from New Relic, listing thresholds, metrics, and targets so the team understands exactly what is being monitored.

List Applications

A stakeholder asks which services are being monitored. The agent queries New Relic's Applications API, filtering by name or host, and returns the full inventory of monitored applications along with their health status indicators.

Check Browser Apps

Product managers want visibility into frontend monitoring. The agent retrieves browser application data from New Relic, showing which client-side apps are instrumented and providing a quick overview of real user monitoring coverage.

Update Notification Routing

An operations engineer needs to reroute alerts to a different channel. The AI agent updates the existing alert channel configuration in New Relic, changing endpoints or notification types without requiring direct API access.

New Relic

Use Cases

Observability meets conversation

See how engineering teams use AI agents to surface New Relic monitoring data, manage alerts, and reduce incident response time without switching context.

Instant Application Health During Incidents

An on-call engineer gets paged about a production issue and messages your AI agent for a quick status check. The agent queries New Relic's Applications API, retrieves the health status and error rate for the affected service, and summarizes the situation in seconds. The engineer gets context immediately instead of waiting for the dashboard to load, cutting initial triage time significantly.

Automated Alert Policy Audits

Your SRE lead asks the agent to review all current alert policies before a quarterly infrastructure review. The AI agent pulls every policy from New Relic, groups them by incident preference, and highlights policies with no conditions attached. The team catches monitoring gaps before they become blind spots in production.

Self-Service Alert Channel Setup

A new team joins the organization and needs alert notifications routed to their Slack channel. Instead of filing an ops ticket, the team lead tells the AI agent the channel name and type. The agent creates the alert channel in New Relic and confirms the configuration. Onboarding completes in one conversation, not one sprint.

Try
New Relic

New Relic

FAQs

Frequently Asked Questions

How does the AI agent retrieve application health data from New Relic?

The agent calls New Relic's REST API to list applications, filtering by name, host, or ID. It returns health status indicators, response times, and error rates for each monitored application. Data is fetched live from your New Relic account and never cached by Tars.

Can the agent create alert policies with specific incident preferences?

Yes. When creating an alert policy, the agent supports all three New Relic incident preference modes: PER_POLICY, PER_CONDITION, and PER_CONDITION_AND_TARGET. You can specify the preference during the conversation, and the agent sets it via the API.

What New Relic API key does Tars require, and how do I generate one?

Tars requires a New Relic User API Key (not an Ingest or Browser key). Generate one from your New Relic account under API Keys in the account settings. You also need to specify your account region (US or EU) to route API calls correctly.

Does Tars store my New Relic monitoring data?

No. Tars queries New Relic's API in real time during conversations. Application metrics, alert policies, and channel configurations are fetched on demand and used only to generate responses. No monitoring data is persisted outside of your New Relic account.

Can the agent delete alert policies, and is there a safeguard?

The agent can delete alert policies by policy ID. You can configure approval rules in Tars so destructive actions like policy deletion require confirmation or manager approval before execution. This prevents accidental removals during conversations.

How is this different from New Relic's built-in AI assistant, NRAI?

New Relic AI (NRAI) works inside the New Relic dashboard for query generation. Tars brings New Relic data into your existing communication channels like Slack, WhatsApp, or your website. Your team gets observability answers where they already work, without switching tools.

Can the agent manage alert channels for webhook-based integrations?

Yes. The agent supports creating and updating alert channels of any type supported by New Relic, including email, Slack, PagerDuty, and custom webhooks. You specify the channel type and configuration details, and the agent handles the API call.

What happens if the agent tries to access an application that does not exist in my account?

The agent handles this gracefully. If a name or ID query returns no results from New Relic, it informs the user that no matching application was found and suggests checking the application name or verifying that the service is instrumented with a New Relic agent.

How to add Tools to your AI Agent

Supercharge your AI Agent with Tool Integrations

Don't limit your AI Agent to basic conversations. Watch how to configure and add powerful tools making your agent smarter and more functional.

Privacy & Security

We’ll never let you lose sleep over privacy and security concerns

At Tars, we take privacy and security very seriously. We are compliant with GDPR, ISO, SOC 2, and HIPAA.

GDPR
ISO
SOC 2
HIPAA

Still scrolling? We both know you're interested.

Let's chat about AI Agents the old-fashioned way. Get a demo tailored to your requirements.

Schedule a Demo