Skip to content


NetBox can be configured via Event Rules to transmit outgoing webhooks to remote systems in response to internal object changes. The receiver can act on the data in these webhook messages to perform related tasks.

For example, suppose you want to automatically configure a monitoring system to start monitoring a device when its operational status is changed to active, and remove it from monitoring for any other status. You can create a webhook in NetBox for the device model and craft its content and destination URL to effect the desired change on the receiving system. Webhooks will be sent automatically by NetBox whenever the configured constraints are met.

Security Notice

Webhooks support the inclusion of user-submitted code to generate the URL, custom headers, and payloads, which may pose security risks under certain conditions. Only grant permission to create or modify webhooks to trusted users.

Jinja2 Template Support

Jinja2 templating is supported for the URL, additional_headers and body_template fields. This enables the user to convey object data in the request headers as well as to craft a customized request body. Request content can be crafted to enable the direct interaction with external systems by ensuring the outgoing message is in a format the receiver expects and understands.

For example, you might create a NetBox webhook to trigger a Slack message any time an IP address is created. You can accomplish this using the following configuration:

  • Object type: IPAM > IP address
  • HTTP method: POST
  • URL: Slack incoming webhook URL
  • HTTP content type: application/json
  • Body template: {"text": "IP address {{ data['address'] }} was created by {{ username }}!"}

Available Context

The following data is available as context for Jinja2 templates:

  • event - The type of event which triggered the webhook: created, updated, or deleted.
  • model - The NetBox model which triggered the change.
  • timestamp - The time at which the event occurred (in ISO 8601 format).
  • username - The name of the user account associated with the change.
  • request_id - The unique request ID. This may be used to correlate multiple changes associated with a single request.
  • data - A detailed representation of the object in its current state. This is typically equivalent to the model's representation in NetBox's REST API.
  • snapshots - Minimal "snapshots" of the object state both before and after the change was made; provided as a dictionary with keys named prechange and postchange. These are not as extensive as the fully serialized representation, but contain enough information to convey what has changed.

Default Request Body

If no body template is specified, the request body will be populated with a JSON object containing the context data. For example, a newly created site might appear as follows:

    "event": "created",
    "timestamp": "2021-03-09 17:55:33.968016+00:00",
    "model": "site",
    "username": "jstretch",
    "request_id": "fdbca812-3142-4783-b364-2e2bd5c16c6a",
    "data": {
        "id": 19,
        "name": "Site 1",
        "slug": "site-1",
            "value": "active",
            "label": "Active",
            "id": 1
        "region": null,
    "snapshots": {
        "prechange": null,
        "postchange": {
            "created": "2021-03-09",
            "last_updated": "2021-03-09T17:55:33.851Z",
            "name": "Site 1",
            "slug": "site-1",
            "status": "active",


The setting of conditional webhooks has been moved to Event Rules since NetBox 3.7

Webhook Processing

Using Event Rules, when a change is detected, any resulting webhooks are placed into a Redis queue for processing. This allows the user's request to complete without needing to wait for the outgoing webhook(s) to be processed. The webhooks are then extracted from the queue by the rqworker process and HTTP requests are sent to their respective destinations. The current webhook queue and any failed webhooks can be inspected under System > Background Tasks.

A request is considered successful if the response has a 2XX status code; otherwise, the request is marked as having failed. Failed requests may be requeued manually under System > Background Tasks.


To assist with verifying that the content of outgoing webhooks is rendered correctly, NetBox provides a simple HTTP listener that can be run locally to receive and display webhook requests. First, modify the target URL of the desired webhook to http://localhost:9000/. This will instruct NetBox to send the request to the local server on TCP port 9000. Then, start the webhook receiver service from the NetBox root directory:

$ python netbox/ webhook_receiver
Listening on port http://localhost:9000. Stop with CONTROL-C.

You can test the receiver itself by sending any HTTP request to it. For example:

$ curl -X POST http://localhost:9000 --data '{"foo": "bar"}'

The server will print output similar to the following:

[1] Tue, 07 Apr 2020 17:44:02 GMT "POST / HTTP/1.1" 200 -
Host: localhost:9000
User-Agent: curl/7.58.0
Accept: */*
Content-Length: 14
Content-Type: application/x-www-form-urlencoded

{"foo": "bar"}

Note that webhook_receiver does not actually do anything with the information received: It merely prints the request headers and body for inspection. If you don't see any output, check that the rqworker process is running and that webhook events are being placed into the queue.

Webhook results can be found in the NetBox admin UI under the Background Tasks section. You can see any finished or failed runs, as well as the error log for failed webhooks.