Deploy correlation

Every incident, automatically tagged with the release that caused it.

POST your CI/CD deploys to a signed webhook. When Radar opens an investigation, it scans the last 2 hours of deploys for that service and attaches the most likely culprit — with a confidence score based on how close the deploy was to the incident start.

What you'll actually see
incident · INC-2041 · payments-api
Correlated deployconfidence · high
versionv3.42.1serviceacme-paymentsdeployed at2026-05-12 14:19:11 UTCincident at2026-05-12 14:21:04 UTCdelta+1m 53sgit sha9f8e7d6c · refactor: stripe webhook handler
POST /api/public/deploys/{workspaceId}
{ "version": "v3.42.1", "service_slug": "acme-payments", "deployed_at": "2026-05-12T14:19:11Z", "metadata": { "git_sha": "9f8e7d6c", "git_message": "refactor: stripe webhook handler", "deployed_by": "github-actions", "environment": "production" }, "dedupe_key": "github:9f8e7d6c" }
header · hmac-sha256
x-deploy-signature: 3a6f...c9b2

What changes for the on-call engineer

Stop guessing

The deploy chip appears on every investigation. No more #deploys archaeology at 3 a.m.

Confidence-scored

<10 min = high. <30 min = medium. <2h = low. So you know how seriously to take the link.

Per-service or workspace-wide

Same-service deploys outrank workspace-wide events. The right culprit gets surfaced.

How it works

step · 01

Generate a secret

Workspace admin generates an HMAC secret in settings. Store it in your CI.

step · 02

POST on deploy

Add one curl to your release pipeline — GitHub Actions, GitLab CI, Argo, anything.

step · 03

Read the chip

Every investigation now shows "Correlated deploy" with the version, sha, and confidence.

Resolve incidents in 30 seconds, not 30 minutes.

Connect your AWS account in read-only mode and let Radar take the next page.