Skip to content

projectkeas/connector-spacelift

Repository files navigation

Spacelift Connector

The Spacelift connector allows for the ingestion of Audit Trail events from Spacelift. To setup the connector, use the following guide and ensure that the URL used for the ingestion ends with /integrations/spacelift/audit.

Endpoints

Url Methods Description
/ingest POST Captures a given event into the system (assuming it passes validation and ingestion policies)
/_system/health GET The liveness health check endpoint
/_system/health/ready GET The readiness health check endpoint

Configuration

The Spacelift connector looks the following configuration objects within a Kubernetes cluster:

  • ConfigMaps:
    • connector-spacelift-cm
  • Secrets:
    • connector-spacelift-secret
    • ingestion-secret

ConfigMap - connector-spacelift-cm

Key Description
ingestion.uri The path of the ingestion API, including the /ingest suffix. Default: http://keas-ingestion.keas.svc.cluster.local/ingest
log.level The log level that should be written to the console. Default: debug
server.port The port to listen on. It can be useful to change this for local development. Default: 5000

Secret - connector-spacelift-secret

This secret is required. If the secret does not exist, the readiness checks will fail.

Key Description
spacelift.webhook.token The secret used to validate that the incoming requests are indeed coming from Spacelift. This must match what's you set on the Spacelift UI

Secret - ingestion-secret

This secret is required. If the secret does not exist, the readiness checks will fail. This secret is often setup by the Ingestion API.

Key Description
ingestion.auth.token The API Key that's used for authentication against the ingestion API