No results for ""
EXPAND ALL
  • Home
  • API docs

GIVE DOCS FEEDBACK

Building an audit log event hook integration

Read time: 4 minutes
Last edited: May 01, 2024

Overview

This guide explains how LaunchDarkly partners can use the integration framework to build an audit log event hook integration. By the end of this guide, you as a LaunchDarkly partner should have the information you need to create an audit log events hook integration that LaunchDarkly sends whenever an event happens inside of LaunchDarkly.

Each of these events results in an event being published to LaunchDarkly's audit log. You can use this capability to send data to or trigger an event in another service.

Audit log events

Every resource you change in LaunchDarkly generates an associated audit log entry. Your integration can transform these events into a format that a POST endpoint can receive. Your team can configure the POST endpoint when they set up the integration.

A common use case for the events hook is associating feature flag changes with targeting changes in a specific environment. However, integrations are not limited to that resource only. For a full list of supported resources, read About resource types and scopes.

Build an integration

To build an integration, make sure you meet the prerequisites. Then follow the steps outlined on the Getting started page.

The Getting started page explains each of the following steps in detail:

  1. Forking the LaunchDarkly Integration Framework repository.
  2. Creating a new directory.
  3. Creating an integration manifest.
  1. Collecting integration configuration data.
  2. Defining the integration's capabilities.
  • For this integration, define an auditLogEventsHook integration.
  • To review the fields for the source payload, read Sample Context which contains a directory of samples with pre-transformed contexts.
  1. Validating the integration.
  2. Creating end-user documentation and README.
  3. Submitting the integration.

The following sections provide configuration guidance specific to audit log events hook integrations.

Authentication

An audit log event hook integration can use either API keys or OAuth for authentication:

For an example OAuth integration, read AppDynamics Manifest under requiresOAuth. Integrations with require OAuth can still request additional formVariables.

The example below uses API Keys.

Manifest.json example

This example is looking for a flag template file under templates/flag.json.

The defaultPolicy limits the events to flag targeting changes for targeting in all production environments of all projects:

{
"name": "Sample Integration",
"version": "1.0.0",
"overview": "Short one-liner describing your integration.",
"description": "Send flag data to space. Markdown-based description.",
"author": "Example Dot Com",
"supportEmail": "support@example.com",
"links": {
"site": "https://example.com",
"privacyPolicy": "https://example.com/privacy"
},
"categories": ["monitoring"],
"icons": {
"square": "assets/images/square.svg",
"horizontal": "assets/images/horizontal.svg"
},
"requiresOAuth": false,
"formVariables": [{
"key": "apiToken",
"name": "API key",
"type": "string",
"description": "Enter your Example [API key](https://example.com).",
"isSecret": true
},
{
"key": "endpointUrl",
"name": "Example host URL",
"description": "Your Example host URL.",
"type": "enum",
"allowedValues": [
"https://api.example.com",
"https://api.example.eu"
],
"isOptional": true,
"defaultValue": "https://api.example.com"
}
],
"capabilities": {
"auditLogEventsHook": {
"includeErrorResponseBody": false,
"endpoint": {
"url": "{{endpointUrl}}",
"method": "POST",
"headers": [{
"name": "Content-Type",
"value": "application/json"
},
{
"name": "Authorization",
"value": "Bearer {{apiToken}}"
}
]
},
"templates": {
"flag": "templates/flag.json"
},
"defaultPolicy": [{
"effect": "allow",
"resources": ["proj/*:env/production:flag/*"],
"actions": [
"updateFlagVariations",
"updateGlobalArchived"
"updateOn",
"updateRules"
"updatePrerequisites",
"updateTargets",
"createFlag",
"deleteFlag"
]
},
{
"effect": "allow",
"resources": ["proj/*:env/production:segment/*"],
"actions": [
"createSegment",
"deleteSegment"
"updateExcluded",
"updateIncluded"
"updateRules"
]
},
]
}
}
}

Default flag template file

You can customize the flag template file as needed to control the rendering of your JSON payload to fit your expected output. If you don't customize the template, then the webhook uses the default template.

Here is the default template:

{
"date": "{{timestamp.rfc3339}}",
"event": {
"kind": "{{kind}}",
"action": "{{verbKind}}"
},
"tags": "{{tags}}",
"message": "{{{title.plainText}}}",
"details": "{{{details.plainText}}}",
"comment": "{{#if comment}}{{{comment}}}{{/if}}"
}

Conclusion

This guide describes the process of building an audit log event hook integration. To learn more about building your own integrations, read Building partner integrations.

Want to know more? Start a trial.

Your 14-day trial begins as soon as you sign up. Get started in minutes using the in-app Quickstart. You'll discover how easy it is to release, monitor, and optimize your software.

Want to try it out? Start a trial.