Skip to content

Commit f2f2bd2

Browse files
committed
deleted unnecesary lines
1 parent 89057fd commit f2f2bd2

File tree

1 file changed

+6
-12
lines changed

1 file changed

+6
-12
lines changed

docs/administration/security/audit-stream-plugin.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,8 @@ This plugin streams **Rundeck audit events** to external systems via secure, con
3939

4040
Access these properties via the System Configuration menu under Plugins → Audit Stream.
4141

42-
Rundeck must be restarted after applying changes.
43-
4442
### AWS API Gateway Example
4543

46-
- Set these configurations:
4744
```properties
4845
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl=https://api-id.execute-api.us-west-2.amazonaws.com/prod/webhook
4946
framework.plugin.AuditEventListener.WebhookAuditListener.securityType=AWS_SIGV4
@@ -59,7 +56,6 @@ framework.plugin.AuditEventListener.WebhookAuditListener.awsSecretKey=<your-secr
5956

6057
### Azure Function Example
6158

62-
- Set these configurations:
6359

6460
```properties
6561
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl=https://<your-function-app>.azurewebsites.net/api/rundeckwebhook
@@ -70,7 +66,6 @@ framework.plugin.AuditEventListener.WebhookAuditListener.azureHeaderName=x-funct
7066

7167
### Bearer Token Example
7268

73-
- Set these configurations:
7469

7570
```properties
7671
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl=https://api.example.com/secure-audit
@@ -79,35 +74,34 @@ framework.plugin.AuditEventListener.WebhookAuditListener.authToken=<your-bearer-
7974
```
8075
### Custom Headers Example (Datadog, New Relic, etc.)
8176

82-
Datadog:
83-
84-
- Set these configurations:
77+
#### Datadog:
8578

8679
```properties
8780
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl=https://api.datadoghq.com/api/v2/events
8881
framework.plugin.AuditEventListener.WebhookAuditListener.securityType=NONE
8982
framework.plugin.AuditEventListener.WebhookAuditListener.customHeaders=DD-API-KEY:your_api_key,DD-APPLICATION-KEY:your_app_key,Accept:application/json
9083
```
9184

92-
New Relic:
9385

94-
- Set these configurations:
86+
#### New Relic:
9587

9688
```properties
9789
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl=https://insights-collector.newrelic.com/v1/accounts/YOUR_ACCOUNT_ID/events
9890
framework.plugin.AuditEventListener.WebhookAuditListener.securityType=NONE
9991
framework.plugin.AuditEventListener.WebhookAuditListener.customHeaders=X-Insert-Key:your_insert_key //This key must have type: INGEST - LICENSE
10092
```
93+
> Ensure your insert key is of type INGEST – LICENSE
10194
102-
- Set the X-Insert-Key custom header (Ensure the key is of type INGEST – LICENSE):
10395

104-
No Authentication:
96+
97+
#### No Authentication:
10598

10699
```properties
107100
framework.plugin.AuditEventListener.WebhookAuditListener.webhookUrl=https://internal.example.com/webhook
108101
framework.plugin.AuditEventListener.WebhookAuditListener.securityType=NONE
109102
```
110103

104+
111105
### Event Filtering
112106

113107
You can filter which audit events are sent by listing specific actionType values:

0 commit comments

Comments
 (0)