How to setup Deeptrace
Once your workspace is configured, follow these two steps to integrate Deeptrace:Create your Deeptrace account
Click here to log in to your new workspace and follow our authentication flow.
Connect your Integrations
Click here to go to the integrations page and then follow the setup steps for your tools below.
GitHub
GitHub
- Click Connect next to GitHub.
- Follow the GitHub OAuth flow to authorize Deeptrace and select the relevant repositories you’d like Deeptrace to access.
Slack
Slack
-
Click **Connect **next to Slack and complete the OAuth flow.
The channel you choose here doesn’t matter as you can add/remove Deeptrace to any channel
-
In your alert channel, type
@Deeptraceto invite the agent into the channel.
Datadog
Datadog
- Click **Connect **next to Datadaog.
- Find your Datadog site URL (docs)
- In Datadog, create both an API Key and App Key. On each page:
- Click + New Key
- Name it deeptrace and click Create Key
-
Click Copy and save the key to use below
Note: Add these scopes to your Datadog App Key:
apm_read,dashboards_read,logs_read_data,logs_read_index_data,metrics_read,timeseries_query,monitors_read,rum_apps_read(if you use rum)
Sentry
Sentry
- Click Connect next to Sentry.
- Complete the OAuth flow and deselct Sentry Seer.
Grafana
Grafana
Click**Connect ** next to Grafana.To get your Grafana URL:
- Log in to your Grafana instance
- Copy the base URL from your browser (e.g., https://mycompany.grafana.net)
- Paste it into the Grafana URL field
- Go to Administration → Users and access → Service accounts
- Click Add service account
- Fill in the account details:
- Display name: deeptrace
- Role: Viewer
- Click Create
- Click Add service account token:
- • Display name: deeptrace-token
- • Expiration: No Expiration
- Click Generate token
- Copy the token and paste it into the Service Account Token field
Self-Hosted Grafana
Self-Hosted Grafana
- Click Connect next to Self-Hosted Grafana.
- Follow our detailed setup instructions to connect your Self-Hosted Grafana MCP server.
AWS Cloudwatch
AWS Cloudwatch
- Click Connect next to AWS Cloudwatch.
- Go to the AWS CloudFormation console → Create stack → with new resources
- Specify the template as Upload a template file
- Upload the config.yaml file (download it using the button below)
- Click Next, enter stack name as “deeptrace”
- Click Next, acknowledge the capabilities checkbox, then click Next
- Click Submit to create the stack
- Once the stack creation completes (this may take around 30 seconds to a minute), go to the Outputs tab
- Copy the RoleArn value and paste it in the field above
PagerDuty
PagerDuty
- Click Connect next to PagerDuty
- Create a token in PagerDuty under User Settings → API Access.
- Copy and paste this into the Deeptrace UI.
Prerequisite: Your team is on a paid PagerDuty plan.
Snowflake
Snowflake
Click Connect next to Snowflake.To find your Account Identifier:
- Log in to your Snowflake account
- Your account identifier is in the URL:
https://<account_identifier>.snowflakecomputing.com - Example:
YWKSTOS-BBB93431
-
In Snowflake, run the following SQL as an admin:
-
Get the client credentials:
- Copy the OAUTH_CLIENT_ID and OAUTH_CLIENT_SECRET from the result
- Paste them into the fields on the Deeptrace UI
Honeycomb
Honeycomb
Click Connect next to Honeycomb.To get your Management API Key:
- Go to Team Settings on Honeycomb
- Navigate to API Keys
- Click Create Management API Key
- Set the scope to read-only for environments and MCP
- Copy the Secret Key and paste it into the Secret Key field
- Copy the Key ID and paste it into the Key ID field
- Click Connect Honeycomb
Posthog
Posthog
- Click **Connect **next to Posthog.
- Go to the API keys page via this link
- Click Create personal API key with the name deeptrace
- Configure the API key with read access for the following scopes: Dashboards, Insights, Queries, Feature Flags, Experiments, Surveys, Error Tracking, Organization, Project, Events, Properties
- Click Create key and copy the generated API key
- Paste it into the API Key field on the setup form
pganalyze
pganalyze
- Click Connect next to pganalyze.
- Log in to your pganalyze account at app.pganalyze.com
- Navigate to Settings → API Keys
- Click Create New API Key (Read API Key)
- Copy the generated key and paste it into the API Key field
- For each database you want to monitor:
- Navigate to its dashboard page in pganalyze
- Copy the number at the end of the URL
- e.g. -123456789 in app.pganalyze.com/databases/-123456789
- Enter each Database ID in the field and click Add
BYO MCP
BYO MCP
- Click **Add Custom MCP **next to custom integrations.
- After clicking Add Custom MCP, create a display name for this integration
- Input the streamable HTTP endpoint of your MCP server
- Enter the Auth Header Name, the HTTP header name for authentication (e.g. “X-API-Key”)
- Add the Auth Secret, this is the pre-shared secret or API key. This will be encrypted and stored securely.
- Provide a description on what this MCP does. This helps the agent understand when and how to use it.
Notion
Notion
- Click Connect next to Notion
- Select the relevant pages to grant Deeptrace access to
Linear
Linear
- Click Connect next to Linear
- Select the teams to grant Deeptrace access to (public and select private teams)
Don’t see your integration listed? Reach out to [email protected] to request a new integration.