Webhooks let you stream Signal Ark intelligence to any system that can receive an HTTP POST request — data warehouses, automation platforms, custom dashboards, or internal tools. When a signal is promoted, matched to a play, or reaches a scoring threshold, Signal Ark POSTs a structured JSON payload to your configured endpoint.Documentation Index
Fetch the complete documentation index at: https://docs.signalark.app/llms.txt
Use this file to discover all available pages before exploring further.
Configure a webhook destination
Add a destination URL
Click Add Destination and enter the URL of the endpoint that should receive webhook events. Your server must be publicly accessible over HTTPS.
Verify connectivity
Signal Ark immediately sends a
ping event to the URL you provided. Confirm your endpoint received the request before saving. If it did not, check that your server is reachable and returns a 2xx status code.You can configure multiple webhook destinations. Each destination receives all events — per-destination event filtering is not currently supported.
Payload format
Every webhook request is an HTTP POST with aContent-Type: application/json header. The payload contains a complete snapshot of the signal, its associated account context, and any matched plays at the time of delivery.
Event types
| Event | Description |
|---|---|
ping | Sent immediately when you add a new webhook destination to verify connectivity. |
signal.promoted | A signal passed ICP filtering and was promoted to your active pipeline. |
signal.play_matched | A promoted signal matched one or more Play Templates. |
social.lead_promoted | A social engagement event was scored high enough to enter the sales pipeline. |
Retry behavior
If your endpoint returns a non-2xx status code or does not respond within 10 seconds, Signal Ark retries the delivery with exponential backoff:
| Attempt | Delay |
|---|---|
| 1st retry | 30 seconds |
| 2nd retry | 5 minutes |
| 3rd retry | 30 minutes |
| 4th retry | 2 hours |
Verifying webhook authenticity
Signal Ark signs every webhook request with anX-SignalArk-Signature header. The signature is an HMAC-SHA256 hash of the raw request body, computed using your webhook signing secret.
To verify a request:
- Retrieve your signing secret from Settings > Integrations > Webhooks.
- Compute
HMAC-SHA256(signing_secret, raw_request_body). - Compare the result to the value in
X-SignalArk-Signature. Reject requests where the values do not match.