Alerts Integration and Configuration

Receive notifications when there is new activity or a new incident on your Code Defender console?

Code Defender Alerts Integration allows you to configure an alert to be sent to your desired messaging channel for every new incident or action on your Code Defender Console.

Alert notification in SlackAlert notification in Slack

Alert notification in Slack

The following information must be provided to PerimeterX according to how you wish to receive the notifications:

For more information, contact PerimeterX Support

Jira

Field

Example

Notes/How To Retrieve

Jira webhook URL

https://clientName.atlassian.net

Client’s Jira URL

Jira reporting user Email

[email protected]

Jira API token

4sriWwJRctIEcHA5c0XXXXX

Generate an API token

Project Id / Project Key

id: XXXXX
key: CDTESTS

A list of all projects ids and keys - https://clientName.atlassian.net/rest/api/2/project

Desired Issue Type (optional)

Bug, Story, Task

The field should predefined in costumer’s project

Event’s Risk Level Priorities (optional)

Jira issues will have priority value of event’s risk level

Priority context field should predefined in costumer’s project

Slack

Field

Example

Notes/How To Retrieve

Webhook URL

https://hooks.slack.com/services/T03N5LR4T/BT4KEEQ6M/XXXXXXXXXXXXX

Add a webhook integration to an active channel:

https://slack.com/intl/en-il/help/articles/115005265063-Incoming-Webhooks-for-Slack

slack-channel

#px-notifications

PagerDuty

Field

Example

Notes/How To Retrieve

Webhook URL

https://api.pagerduty.com/incidents

service_id

PZ61XXXX

Create a new Service (or have an existing one and retrieve the service ID)
https://support.pagerduty.com/docs/services-and-integrations

api_token

Generate a new API Token:

https://support.pagerduty.com/docs/generating-api-keys

OpsGenie

Field

Example

Notes/How to Retrieve

Webhook URL

https://api.opsgenie.com/v2/alerts

team_id (optional)

802f233e-a0d3-4b80-848e-3d6aa8XXXXX

Have a team connected to a schedule and retrieve the ID (usually from the address bar)

https://docs.opsgenie.com/docs/alert-api

api_token

GenieKey 344c1a72-de33-48d6-9107-6f8e8XXXXX

Using the correct permissions, create a GenieKey

https://docs.opsgenie.com/docs/api-key-management

DataDog

DataDog Events

For more information, see the DataDog docs

Field

Example

Notes/How To Retrieve

Webhook URL

https://api.datadoghq.com/api/v1/events?api_key=<api_key>&app_key=<app_key

api_key

b511eb699cad715612675b39b11XXXXX

using API → API keys in DD console

app_key

b511eb699cad715612675b39b11XXXXX

using API → API keys in DD console

DataDog Incidents

For more information, see the DataDog docs

Field

Example

Notes/How To Retrieve

Webhook URL

https://api.datadoghq.com/api/v2/incidents

api_key

b511eb699cad715612675b39b11XXXXX

using API → API keys in DD console

app_key

b511eb699cad715612675b39b11XXXXX

using API → API keys in DD console

Splunk

Field

Example

Notes/How To Retrieve

Webhook URL

https://prd-p-6llhp.splunkcloud.com:8088/services/collector/raw

api token

Splunk 2e217180-342d-4ba2-b4b6-4e587b3a07ca

Email

Field

Example

Notes/How to Retrieve

Webhook URL

[email protected]


Did this page help you?