@@ -39,11 +39,8 @@ This plugin streams **Rundeck audit events** to external systems via secure, con
39
39
40
40
Access these properties via the System Configuration menu under Plugins → Audit Stream.
41
41
42
- Rundeck must be restarted after applying changes.
43
-
44
42
### AWS API Gateway Example
45
43
46
- - Set these configurations:
47
44
``` properties
48
45
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl =https://api-id.execute-api.us-west-2.amazonaws.com/prod/webhook
49
46
framework.plugin.AuditEventListener.WebhookAuditListener.securityType =AWS_SIGV4
@@ -59,7 +56,6 @@ framework.plugin.AuditEventListener.WebhookAuditListener.awsSecretKey=<your-secr
59
56
60
57
### Azure Function Example
61
58
62
- - Set these configurations:
63
59
64
60
``` properties
65
61
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl =https://<your-function-app>.azurewebsites.net/api/rundeckwebhook
@@ -70,7 +66,6 @@ framework.plugin.AuditEventListener.WebhookAuditListener.azureHeaderName=x-funct
70
66
71
67
### Bearer Token Example
72
68
73
- - Set these configurations:
74
69
75
70
``` properties
76
71
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl =https://api.example.com/secure-audit
@@ -79,35 +74,34 @@ framework.plugin.AuditEventListener.WebhookAuditListener.authToken=<your-bearer-
79
74
```
80
75
### Custom Headers Example (Datadog, New Relic, etc.)
81
76
82
- Datadog:
83
-
84
- - Set these configurations:
77
+ #### Datadog:
85
78
86
79
``` properties
87
80
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl =https://api.datadoghq.com/api/v2/events
88
81
framework.plugin.AuditEventListener.WebhookAuditListener.securityType =NONE
89
82
framework.plugin.AuditEventListener.WebhookAuditListener.customHeaders =DD-API-KEY:your_api_key,DD-APPLICATION-KEY:your_app_key,Accept:application/json
90
83
```
91
84
92
- New Relic:
93
85
94
- - Set these configurations :
86
+ #### New Relic :
95
87
96
88
``` properties
97
89
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl =https://insights-collector.newrelic.com/v1/accounts/YOUR_ACCOUNT_ID/events
98
90
framework.plugin.AuditEventListener.WebhookAuditListener.securityType =NONE
99
91
framework.plugin.AuditEventListener.WebhookAuditListener.customHeaders =X-Insert-Key:your_insert_key //This key must have type: INGEST - LICENSE
100
92
```
93
+ > Ensure your insert key is of type INGEST – LICENSE
101
94
102
- - Set the X-Insert-Key custom header (Ensure the key is of type INGEST – LICENSE):
103
95
104
- No Authentication:
96
+
97
+ #### No Authentication:
105
98
106
99
``` properties
107
100
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl =https://internal.example.com/webhook
108
101
framework.plugin.AuditEventListener.WebhookAuditListener.securityType =NONE
109
102
```
110
103
104
+
111
105
### Event Filtering
112
106
113
107
You can filter which audit events are sent by listing specific actionType values:
0 commit comments