Step 3: Set up notifications for vulnerabilities
Notifications allow third-party platforms to ingest information through webhooks. Currently, Secure Application in Splunk Observability Cloud only supports HTTP-based notifications.
- How notifications work
-
The Secure Application JVM agent sends library dependency information to Secure Application. Certain conditions related to this information triggers a notification, such as:
- Secure Application identifies a new vulnerability match.
- A matched library disappears (due to an upgrade).
- Secure Application finds a new vulnerability on an existing library.
When a notification is triggered, Secure Application delivers that notification directly to the endpoint you specified when you set up the notification rule. Your specified endpoint receives a predefined JSON payload containing information about the vulnerability.
Create a rule to send a notification:
-
Select .
-
Specify settings for the new rule:
-
Rule name: Name of the rule.
-
URL: Endpoint to deliver the notification to.
-
Bearer token:
- To send notifications to Splunk Cloud or Splunk Platform
-
-
Generate an HTTP Event Collector (HEC) token that allows access to your account. To learn more, see Set up and use HTTP Event Collector in Splunk Web.
-
Paste the HEC token you generated into the Bearer token field. Example:
Splunk hec-token.
-
- To send notifications to other platforms
-
Enter the
Authorization: Bearerheader value (token) for your webhook URL auth.
- Environment: List of allowed services as a filter. Optional.
- Service: List of allowed environments as a filter. Optional.
-
- Select Activate.