Available Integrations

Artifact

Amazon S3

The following figure depicts the information to be supplied to add Amazon S3 as an integration.

Following are the fields:

  • Account Name: Name of the Amazon account to operate on

  • Access Key ID: Your AWS Access Key ID. If not provided, Halyard/Spinnaker will try to find AWS credentials as described at http://docs.aws.amazon.com/sdk-for-java/v1/developer-guide/credentials.html#credentials-default

  • Secret Access Key: Your AWS Secret Key

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

  • Group and permission: Enable all access to all the groups for this.

Note: To select a group, click on the drop-down arrow under select group.

Artifactory

The following figure depicts the information to be supplied to add Artifactory as an integration.

Following are the fields:

  • Account Name: Name of the Artifactory account to operate on

  • Host URL: The base url your Artifactory search is reachable at

  • Repo: The repo in your Artifactory to be searched

  • Repo Type: The package type of repo in your Artifactory to be searched

  • Group ID: The group id in your Artifactory to be searched

  • Authentication Type: Select the user authentication mode for Artifactory

  • User Name: Provide Artifactory user name

  • Token / Password: Provide Artifactory token or password, based on the authentication type selected

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

  • Read Permissions: A user must have at least one of these roles in order to view this build search or use it as a trigger source

  • Write Permissions: A user must have at least one of these roles in order to be able to run jobs on this build search

  • Group and Permission: Enable all access to all the groups for this.

Bitbucket Cloud

The following figure depicts the information to be supplied to add Bitbucket Cloud as an integration.

Following are the fields:

  • Account Name: Name of the Bitbucket account to operate on

  • Host URL: The base url your Bitbucket search is reachable at

  • API URL: Your organizations unique API url

  • Authentication Type: Select the user authentication mode for Bitbucket

  • User Name: Provide Bitbucket user name

  • Token / Password: Provide Bitbucket token or password depending on the authentication type selected

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

  • Group and Permission: Enable all access to all the groups for this.

Bitbucket Server

The following figure depicts the information to be supplied to add Bitbucket Server as an integration.

Following are the fields:

  • Account Name: Name of the Bitbucket account to operate on

  • Host URL: The base url your Bitbucket search is reachable at

  • Authentication Type: Select the user authentication mode for Bitbucket

  • User Name: Provide Bitbucket user name

  • Token / Password: Provide Bitbucket token or password depending on the authentication type selected

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

  • Group and Permission: Enable all access to all the groups for this.

Docker Registry

The following figure depicts the information to be supplied to add Docker Registry as an integration.

Following are the fields:

  • Account Name: Name of the Bitbucket account to operate on

  • Registry URL: Your Docker Registry url

  • Email: Provide the email ID of the Atlassian user

  • Repo: The repo in your Artifactory to be searched

  • Authentication Type: Select the user authentication mode for Docker Registry

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

  • Group and Permission: Enable all access to all the groups for this.

CI

Jenkins

The following figure depicts the information to be supplied to add Jenkins as an integration.

Following are the fields:

  • Account Name: Name of the Jenkins account to operate on

  • Host URL: Host URL for the Jenkins instance you are connecting to

  • Authentication Type: Select the type of authentication mechanism you want to use to get authenticated to Jenkins server

  • User Name: Provide the username on the Jenkins server

  • Token / Password: Provide the token or password, depending on the authentication type selected

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

  • Read Permissions:

  • Write Permissions:

Governance

JIRA

The following figure depicts the information to be supplied to add JIRA as an integration.

Following are the fields:

  • Account Name: Name of the JIRA account to operate on

  • Email: Provide the email ID of the Atlassian user

  • Token: Provide the password of the Atlassian user

  • Host URL: Provide Atlassian Host URL (for both Cloud or On-prem Atlassian)

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

ServiceNow

Monitoring Tools

AWS Cloudwatch

The following figure depicts the information to be supplied to add AWS CloudWatch as an integration.

Following are the fields:

  • Account Name: Name of the AWS Cloudwatch account to operate on

  • Access Key ID: The default access key used to communicate with AWS Cloudwatch

  • Secret Access Key: The default secret key used to communicate with AWS Cloudwatch

AppDynamics

To set up AppDynamics to work with the OpsMx ISD Verification gate feature, AppDynamics should be added as the monitoring provider.

Follow the below steps to add AppDynamics as an integration.

  • Add Monitoring Provider : Add AppDynamics as an integration. To add an integration, refer here. Search "AppDynamics" and select AppDynamics under Monitoring Tools.

  • Fill in the following information on the above screen.

    1. Account Name: Enter a name for the AppDynamics connection. This is the name you will select when you choose a Datasource provider during metrics configuration.

    2. Controller Host: Enter the URL for your AppDynamics account for API access. For example, enter the full URL of your AppDynamics controller, such as https://opsmx-nfr.saas.appdynamics.com/

    3. Temporary Access Token: You can generate and use the access token for API access calls into your Controller by generating the token through Administration UI. The account administrator can generate and distribute to parties/teams who need Controller access. To generate the token, refer here.

    4. Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.

    5. Save: To finish configuring the AppDynamics provider, click on "Save". OpsMx ISD verifies the settings you entered. The AppDynamics provider is now added to OpsMx ISD.

To use AppDynamics Provider for verification, refer here.

Datadog

The following figure depicts the information to be supplied to add DataDog as an integration.

Following are the fields:

ElasticSearch

The following figure depicts the information to be supplied to add ElasticSearch as an integration.

Following are the fields:

  • Account Name: Name of the Elastic account to operate on

  • Elastic End Point: End of the Elasticsearch URL for the account to operate on

  • User Name: Provider the user name for the ElasticSearch instance

  • Password: Provider the password for the ElasticSearch instance

  • Kibana End Point: Endpoint URL for the Kibana instance

  • Kibana User Name: Provide the username for the Kibana instance

  • Kibana Password: Provide the password for the Kibana instance

Graphite

The following figure depicts the information to be supplied to add Graphite as an integration.

Following are the fields:

  • Account Name: Name of the Graphite account to operate on

  • End Point: URL of the endpoint of Graphite

Graylog

NewRelic

The following figure depicts the information to be supplied to add New Relic as an integration.

Following are the fields:

Prometheus

The following figure depicts the information to be supplied to add Prometheus as an integration.

Following are the fields:

  • Account Name: Name of the Prometheus account to operate on

  • End Point: The base URL to the Prometheus server

  • User Name: Provide Prometheus User Name

  • Password: Provide Prometheus Password

Splunk

The following figure depicts the information to be supplied to add Splunk as an integration.

Following are the fields:

  • Account Name: Name of the Splunk account to operate on

  • Splunk URL: The base URL to the Splunk server

  • User Name: Provide Splunk user name

  • Password: Provide Splunk password

  • Splunk Dashboard URL: Provide URL of the Splunk dashboard

Stackdriver

The following figure depicts the information to be supplied to add Stackdriver as an integration.

Following are the fields:

  • Account Name: Name of the Stackdriver account to operate on

  • Encrypted Key File: A path to a Google JSON service account that has permission to publish metrics.

SumoLogic

The following figure depicts the information to be supplied to add SumoLogic as an integration.

Following are the fields:

  • Account Name: Name of the Sumologic account to operate on

  • Access ID:

  • Access Key:

  • Zone:

VMWare Tanzu Observability

We have extended the list of supported monitoring tools by adding support to Tanzu Observability from VMware. Now you can use ISD to perform continuous verification on Metrics from Tanzu Observability to get real-time insights and mitigate risks during continuous delivery.

The below figure depicts the information to be provided to add "VMWare Tanzu Observability" as an integration.

Following are the fields:

  • Account Name: Name of the VMWare Tanzu Observability account to operate on

  • End Point: Provide the URL of the VMWare Tanzu Observability server

  • API Token: Provide the API token for VMWare Tanzu Observability

Notifications

Slack

The following figure depicts the information to be supplied to add Slack as an integration.

Following are the fields:

  • Account Name: Name of the Slack account to operate on

  • Bot Name: Provide the name of your slack bot

  • Token: Provide the slack bot token

  • Connect to Spinnaker: Enable the selection & Select the spinnaker instance you want to associate this account to

Policy

OPA (Open Policy Agent)

The following figure depicts the information to be supplied to add OPA (Open Policy Agent) as an integration.

Following are the fields:

  • Account Name: Name of the OPA account to operate on

  • End Point: Provide the URL of the OPA server

SAST/DAST

AquaWave

The following figure depicts the information to be supplied to add AquaWave as an integration.

Following are the fields:

  • Account Name: Name of the Aquawave account to operate on

  • User Name: Provide the username for Aqua wave

  • Bearer Token: Provide the bearer token for Aqua wave

HCL AppScan

The following figure depicts the information to be supplied to add HCL AppScan as an integration.

Following are the fields:

  • Account Name: Name of the HCL Appscan account to operate on

  • Bearer Token: Provide the bearer token for HCL Appscan

SonarQube

The following figure depicts the information to be supplied to add SonarQube as an integration.

Following are the fields:

  • Account Name: Name of the Sonarqube account to operate on

  • Host URL: Provide the host URL of the SonarQube Server

  • Token: Provide the token to access the SonarQube server

Verification

Autopilot

The following figure depicts the information to be supplied to add Autopilot as an integration.

Following are the fields:

  • Account Name: Name of the account to operate on

  • User Name: Provide the user name with which you would access the OES verification services

Last updated