Purpose-built for DevOps and SecOps
Configure the Webhook's content type to be application/JSON.
Also, configure the 'Which events would you like to trigger this webhook?' to be Just the push event
to trigger the workflow only on a new push event.
For further details check out our documentation: https://www.docs.blinkops.com/docs/Integrations/github/triggers/github-webhook-event
SecOps_personnel
.regex_table_name
in step 1 part 3. The files to examine are added or modified files in the commit
Revert commit
- reverting the commit and opening a PR for the change.Ignore
- no further action will be taken, which allows he committer to handle the commit on his own. A report will be sent to the relevant SecOps personnel informing them about the commit. Not recommended!This workflow assume your organisation uses same email for github, blink and slack employee's account
If needed to retrieve the credentials - use a key for the following hash and preferably save it in the global variable secret manager.
The hash used is: sha256
from the hashlib
library in python.
To get your column names, run step 17 without the given Query body. The output in the results section will indicate the names of the column. Note you must have at list one row in the table.
After retrieving the column names, change the body and other fields in later steps containing column names and change them accordingly.
For example, an output received :
{
"limit": 25,
"offset": 0,
"total": 4,
"results": [
{
"created_by": "test@example.com",
"updated_by": "test@example.com"",
"id": "3eba7c05-8efa-48c7-9ce1-e427e44c0680",
"name": "FILE NAME",
"line": 1,
"encrypted_whitelist_credentials": "CREDENTIAL",
"created_at": 1676214690483,
"updated_at": 1676214690483
}
]
}
If the pull request fails, the change will be committed on the new branch and the committer will have to manually open a pull request for the branch.