All posts

What New Relic Pulsar Actually Does and When to Use It

Picture a team of engineers waiting on yet another approval just to poke a service for metrics. Minutes stretch into hours while alerts pile up like unread email. New Relic Pulsar was built to stop that nonsense. It brings consistent, auditable access control to observability data, so you can troubleshoot without begging for credentials. New Relic Pulsar extends New Relic’s monitoring platform with secure policy-based access. It integrates deep identity enforcement, letting you define who can r

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Picture a team of engineers waiting on yet another approval just to poke a service for metrics. Minutes stretch into hours while alerts pile up like unread email. New Relic Pulsar was built to stop that nonsense. It brings consistent, auditable access control to observability data, so you can troubleshoot without begging for credentials.

New Relic Pulsar extends New Relic’s monitoring platform with secure policy-based access. It integrates deep identity enforcement, letting you define who can run what workloads and see which telemetry. Pulsar acts as a gatekeeper across environments, ensuring that dashboards, logs, and traces stay protected under one policy layer. The result is unified insight without scattered secrets or ad hoc permissions.

At its core, Pulsar links your identity provider—say Okta or Azure AD—to New Relic resources through short-lived credentials. When a request comes in, Pulsar checks the user’s role and injects the right authorizations dynamically. Developers get instant, compliant access to exactly what they need while managers retain the comfort of full auditability. All of it happens in seconds.

To actually use it, think of three steps. First, connect your workloads or pipelines to Pulsar so every request carries identity context. Second, map roles—Dev, Ops, or SRE—to resource scopes within New Relic via IAM-style policies. Third, automate token rotation and revoke rights when a session ends. No hardcoded keys, no Slack messages begging for secrets.

If something misbehaves, Pulsar logs every decision. You can trace which user viewed a dashboard, which service queried a metric, and when. Treat these logs like gold in compliance audits or SOC 2 reviews. Consistency here saves entire nights of detective work later.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits you actually feel:

  • Access scaled to identity, not static keys
  • Real-time auditing and tamper-proof logs
  • Fewer manual approvals or policy edits
  • Faster onboarding for new engineers
  • Clean separation of observability and production credentials

Platforms like hoop.dev take this model further. They integrate with Pulsar to automate per-session authorization, making sure identity-aware policies travel with your requests across every environment. Instead of writing custom middleware, you get guardrails that enforce your intent automatically.

How do I connect New Relic Pulsar with my CI/CD pipeline?
Add an identity layer, not another secret store. Feed Pulsar ephemeral tokens to your runners so builds authenticate on-behalf-of the developer’s role. Every run leaves a verified audit trail with zero secret leakage.

As AI agents begin querying logs or metrics autonomously, Pulsar’s model becomes vital. Those agents should hold no standing permissions. With policy-enforced identity delegation, you can grant them just-in-time visibility, keeping machine learning workflows secure and compliant.

New Relic Pulsar gives you observability with discipline—fast, consistent, and fully traceable. In other words, fewer security reviews and more actual debugging.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts