How It Works
When an incident is detected, Kestrel automatically:- Searches your connected knowledge sources for relevant context
- Finds similar past incidents and their resolutions
- Locates runbooks and documentation for affected services
- Surfaces team discussions about the affected systems
- Retrieves post-mortems and lessons learned from related incidents
Supported Sources
| Source | Auth Method | Description |
|---|---|---|
| Slack | Kestrel App (no extra setup) | Search messages and threads for relevant discussions |
| Notion | Internal Integration Token | Query Notion pages and documentation |
| Confluence | Email + API Token | Search Confluence wiki pages and spaces |
| Jira | Email + API Token | Find related issues and post-mortems |
| Linear | Personal API Key | Search Linear issues and projects |
| Glean | API Key | Enterprise search across all connected sources |
Setup Instructions
Adding a Source
- Navigate to Integrations → Tribal Knowledge in your Kestrel dashboard
- Click Add Source
- Select the source type from the dropdown
- Follow the source-specific setup instructions below
- Click Add Source to save
Slack
Slack tribal knowledge uses the same Kestrel Slack app as incident notifications. No additional credentials are required. Prerequisites: Your Slack workspace must be connected via the Slack Integration.- Select Slack as the source type
- If your workspace is connected, you’ll see a green confirmation
- Click Enable Slack Search
Notion
- Go to notion.so/my-integrations
- Click + New integration
- Name your integration (e.g., “Kestrel Tribal Knowledge”)
- Select the workspace to associate with the integration
- Copy the Internal Integration Secret token
- Important: Share the pages/databases you want searchable with your integration
- In Kestrel, paste the token in the API Key field
- Optionally enter a Workspace ID
You must explicitly share each page or database with the integration for it to be searchable by Kestrel.
Confluence
- Go to id.atlassian.com/manage-profile/security/api-tokens
- Click Create API token
- Give it a label (e.g., “Kestrel Integration”)
- Copy the generated API token
- In Kestrel, enter:
- Email Address: Your Atlassian account email
- API Token: The token you just created
- Base URL: Your Confluence instance URL (e.g.,
https://yourcompany.atlassian.net)
Jira
Jira uses the same Atlassian API tokens as Confluence:- Go to id.atlassian.com/manage-profile/security/api-tokens
- Create an API token (or reuse the one from Confluence)
- In Kestrel, enter:
- Email Address: Your Atlassian account email
- API Token: The Atlassian API token
- Base URL: Your Jira instance URL (e.g.,
https://yourcompany.atlassian.net)
Linear
- Go to linear.app/settings/account/security
- Click New API Key under Personal API keys
- Give your key a label (e.g., “Kestrel Integration”)
- Copy the generated API key
- In Kestrel, paste the key in the API Key field
Personal API keys have the same permissions as your user account. Consider using a service account for production.
Glean
- Contact your Glean administrator to enable API access
- Go to your Glean Admin Console → API → API Keys
- Click Create API Key
- Select appropriate scopes (
search:readis required) - Copy the generated API key
- In Kestrel, paste the key in the API Key field
- Optionally enter a Workspace ID
Glean API access requires an Enterprise plan. Contact your Glean account manager if you don’t see the API option.
Managing Sources
Testing a Connection
Click the Test button on any source to verify the credentials and connectivity. The source status will update to Connected or Error with a detailed message.Enabling/Disabling Sources
Use the toggle switch on each source to temporarily enable or disable it without removing the configuration.Editing a Source
Click the edit icon to update the display name, credentials, or base URL. Leave credential fields blank to keep the existing values.Deleting a Source
Click the delete icon and confirm to permanently remove a source. Incident analysis will no longer include context from that source.Next Steps
- Set up Slack to enable Slack tribal knowledge
- Configure PagerDuty for on-call alerting