[DOCS] Move preconfigured ServiceNow connector details (#166202)

This commit is contained in:
Lisa Cawley 2023-10-03 09:14:26 -07:00 committed by GitHub
parent 7550f9e0de
commit 0fc24f4181
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 197 additions and 183 deletions

View file

@ -3,6 +3,10 @@
++++
<titleabbrev>{sn-itom}</titleabbrev>
++++
:frontmatter-description: Add a connector that can create {sn} events.
:frontmatter-tags-products: [kibana]
:frontmatter-tags-content-type: [how-to]
:frontmatter-tags-user-goals: [configure]
The {sn-itom} connector uses the
https://docs.servicenow.com/bundle/rome-it-operations-management/page/product/event-management/task/send-events-via-web-service.html[event API]
@ -79,62 +83,6 @@ JWT Key ID:: The key ID assigned to the JWT verifier map of your OAuth applicati
Private Key:: The RSA private key generated during setup.
Private Key Password:: The password for the RSA private key generated during setup, if set.
[float]
[[preconfigured-servicenow-itom-configuration]]
=== Create preconfigured connectors
If you are running {kib} on-prem, you can define connectors by
adding `xpack.actions.preconfigured` settings to your `kibana.yml` file.
For example:
Connector using Basic Authentication
[source,text]
--
xpack.actions.preconfigured:
my-servicenow-itom:
name: preconfigured-servicenow-connector-type
actionTypeId: .servicenow-itom
config:
apiUrl: https://example.service-now.com/
secrets:
username: testuser
password: passwordkeystorevalue
--
Connector using OAuth
[source,text]
--
my-servicenow:
name: preconfigured-oauth-servicenow-connector-type
actionTypeId: .servicenow-itom
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
isOAuth: true
userIdentifierValue: testuser@email.com
clientId: abcdefghijklmnopqrstuvwxyzabcdef
jwtKeyId: fedcbazyxwvutsrqponmlkjihgfedcba
secrets:
clientSecret: secretsecret
privateKey: -----BEGIN RSA PRIVATE KEY-----\nprivatekeyhere\n-----END RSA PRIVATE KEY-----
--
Config defines information for the connector type.
`apiUrl`:: An address that corresponds to *URL*.
`isOAuth`:: A boolean that corresponds to *Is OAuth* and indicates if the connector uses Basic Authentication or OAuth.
`userIdentifierValue`:: A string that corresponds to *User Identifier*. Required if `isOAuth` is set to `true`.
`clientId`:: A string that corresponds to *Client ID*, used for OAuth authentication. Required if `isOAuth` is set to `true`.
`jwtKeyId`:: A string that corresponds to *JWT Key ID*, used for OAuth authentication. Required if `isOAuth` is set to `true`.
Secrets defines sensitive information for the connector type.
`username`:: A string that corresponds to *Username*. Required if `isOAuth` is set to `false`.
`password`:: A string that corresponds to *Password*. Should be stored in the <<creating-keystore, {kib} keystore>>. Required if `isOAuth` is set to `false`.
`clientSecret`:: A string that corresponds to *Client Secret*. Required if `isOAuth` is set to `true`.
`privateKey`:: A string that corresponds to *Private Key*. Required if `isOAuth` is set to `true`.
`privateKeyPassword`:: A string that corresponds to *Private Key Password*.
[float]
[[servicenow-itom-action-configuration]]
=== Test connectors

View file

@ -3,6 +3,10 @@
++++
<titleabbrev>{sn-sir}</titleabbrev>
++++
:frontmatter-description: Add a connector that can create {sn} security incidents.
:frontmatter-tags-products: [kibana]
:frontmatter-tags-content-type: [how-to]
:frontmatter-tags-user-goals: [configure]
The {sn-sir} connector uses the
https://developer.servicenow.com/dev.do#!/reference/api/sandiego/rest/c_ImportSetAPI[import set API]
@ -122,68 +126,6 @@ JWT Key ID:: The key ID assigned to the JWT verifier map of your OAuth applicati
Private Key:: The RSA private key generated during setup.
Private Key Password:: The password for the RSA private key generated during setup, if set.
[float]
[[preconfigured-servicenow-sir-configuration]]
=== Create preconfigured connectors
If you are running {kib} on-prem, you can define connectors by
adding `xpack.actions.preconfigured` settings to your `kibana.yml` file.
For example:
Connector using Basic Authentication
[source,text]
--
xpack.actions.preconfigured:
my-servicenow-sir:
name: preconfigured-servicenow-connector-type
actionTypeId: .servicenow-sir
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
secrets:
username: testuser
password: passwordkeystorevalue
--
Connector using OAuth
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-oauth-servicenow-connector-type
actionTypeId: .servicenow-sir
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
isOAuth: true
userIdentifierValue: testuser@email.com
clientId: abcdefghijklmnopqrstuvwxyzabcdef
jwtKeyId: fedcbazyxwvutsrqponmlkjihgfedcba
secrets:
clientSecret: secretsecret
privateKey: -----BEGIN RSA PRIVATE KEY-----\nprivatekeyhere\n-----END RSA PRIVATE KEY-----
--
Config defines information for the connector type.
`apiUrl`:: An address that corresponds to *URL*.
`usesTableApi`:: A boolean that indicates if the connector uses the Table API or the Import Set API.
NOTE: If `usesTableApi` is set to false, the Elastic application should be installed in {sn}.
`isOAuth`:: A boolean that corresponds to *Is OAuth* and indicates if the connector uses Basic Authentication or OAuth.
`userIdentifierValue`:: A string that corresponds to *User Identifier*. Required if `isOAuth` is set to `true`.
`clientId`:: A string that corresponds to *Client ID*, used for OAuth authentication. Required if `isOAuth` is set to `true`.
`jwtKeyId`:: A string that corresponds to *JWT Key ID*, used for OAuth authentication. Required if `isOAuth` is set to `true`.
Secrets defines sensitive information for the connector type.
`username`:: A string that corresponds to *Username*. Required if `isOAuth` is set to `false`.
`password`:: A string that corresponds to *Password*. Should be stored in the <<creating-keystore, {kib} keystore>>. Required if `isOAuth` is set to `false`.
`clientSecret`:: A string that corresponds to *Client Secret*. Required if `isOAuth` is set to `true`.
`privateKey`:: A string that corresponds to *Private Key*. Required if `isOAuth` is set to `true`.
`privateKeyPassword`:: A string that corresponds to *Private Key Password*.
[float]
[[servicenow-sir-action-configuration]]
=== Test connectors

View file

@ -3,6 +3,10 @@
++++
<titleabbrev>{sn-itsm}</titleabbrev>
++++
:frontmatter-description: Add a connector that can create {sn} incidents.
:frontmatter-tags-products: [kibana]
:frontmatter-tags-content-type: [how-to]
:frontmatter-tags-user-goals: [configure]
The {sn-itsm} connector uses the
https://developer.servicenow.com/dev.do#!/reference/api/sandiego/rest/c_ImportSetAPI[import set API]
@ -206,68 +210,6 @@ JWT Key ID:: The key ID assigned to the JWT Verifier Map of your OAuth applicati
Private Key:: The RSA private key generated during setup.
Private Key Password:: The password for the RSA private key generated during setup, if set.
[float]
[[preconfigured-servicenow-configuration]]
=== Create preconfigured connectors
If you are running {kib} on-prem, you can define connectors by
adding `xpack.actions.preconfigured` settings to your `kibana.yml` file.
For example:
Connector using Basic Authentication
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-servicenow-connector-type
actionTypeId: .servicenow
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
secrets:
username: testuser
password: passwordkeystorevalue
--
Connector using OAuth
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-oauth-servicenow-connector-type
actionTypeId: .servicenow
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
isOAuth: true
userIdentifierValue: testuser@email.com
clientId: abcdefghijklmnopqrstuvwxyzabcdef
jwtKeyId: fedcbazyxwvutsrqponmlkjihgfedcba
secrets:
clientSecret: secretsecret
privateKey: -----BEGIN RSA PRIVATE KEY-----\nprivatekeyhere\n-----END RSA PRIVATE KEY-----
--
Config defines information for the connector type.
`apiUrl`:: An address that corresponds to *URL*.
`usesTableApi`:: A boolean that indicates if the connector uses the Table API or the Import Set API.
NOTE: If `usesTableApi` is set to false, the Elastic application should be installed in {sn}.
`isOAuth`:: A boolean that corresponds to *Is OAuth* and indicates if the connector uses Basic Authentication or OAuth.
`userIdentifierValue`:: A string that corresponds to *User Identifier*. Required if `isOAuth` is set to `true`.
`clientId`:: A string that corresponds to *Client ID*, used for OAuth authentication. Required if `isOAuth` is set to `true`.
`jwtKeyId`:: A string that corresponds to *JWT Key ID*, used for OAuth authentication. Required if `isOAuth` is set to `true`.
Secrets defines sensitive information for the connector type.
`username`:: A string that corresponds to *Username*. Required if `isOAuth` is set to `false`.
`password`:: A string that corresponds to *Password*. Should be stored in the <<creating-keystore, {kib} keystore>>. Required if `isOAuth` is set to `false`.
`clientSecret`:: A string that corresponds to *Client Secret*. Required if `isOAuth` is set to `true`.
`privateKey`:: A string that corresponds to *Private Key*. Required if `isOAuth` is set to `true`.
`privateKeyPassword`:: A string that corresponds to *Private Key Password*.
[float]
[[servicenow-action-configuration]]
=== Test connectors

View file

@ -117,6 +117,9 @@ Index names must start with `kibana-alert-history-` to take advantage of the pre
* <<preconfigured-opsgenie-configuration>>
* <<preconfigured-pagerduty-configuration>>
* <<preconfigured-server-log-configuration>>
* <<preconfigured-servicenow-itom-configuration>>
* <<preconfigured-servicenow-configuration>>
* <<preconfigured-servicenow-sir-configuration>>
* <<preconfigured-slack-configuration>>
* <<preconfigured-swimlane-configuration>>
* <<preconfigured-torq-configuration>>
@ -442,6 +445,155 @@ xpack.actions.preconfigured:
actionTypeId: .server-log
--
[float]
[[preconfigured-servicenow-itom-configuration]]
==== {sn-itom} connectors
The following example creates a <<servicenow-itom-action-type,{sn-itom} connector>> with basic authentication:
[source,text]
--
xpack.actions.preconfigured:
my-servicenow-itom:
name: preconfigured-servicenow-connector-type
actionTypeId: .servicenow-itom
config:
apiUrl: https://example.service-now.com/ <1>
secrets:
username: testuser <2>
password: passwordkeystorevalue <3>
--
<1> The ServiceNow instance URL.
<2> A user name.
<3> A password. NOTE: This value should be stored in the <<creating-keystore, {kib} keystore>>.
The following example creates a {sn-itom} connector with OAuth authentication:
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-oauth-servicenow-connector-type
actionTypeId: .servicenow-itom
config:
apiUrl: https://example.service-now.com/
isOAuth: true <1>
userIdentifierValue: testuser@email.com <2>
clientId: abcdefghijklmnopqrstuvwxyzabcdef <3>
jwtKeyId: fedcbazyxwvutsrqponmlkjihgfedcba <4>
secrets:
clientSecret: secretsecret <5>
privateKey: -----BEGIN RSA PRIVATE KEY-----\nprivatekeyhere\n-----END RSA PRIVATE KEY----- <6>
--
<1> Specifies whether the connector uses basic or OAuth authentication.
<2> The user identifier.
<3> The client identifier assigned to your OAuth application.
<4> The key identifier assigned to the JWT verifier map of your OAuth application.
<5> The client secret assigned to your OAuth application.
<6> The RSA private key. If it has a password, you must also provide `privateKeyPassword`.
[float]
[[preconfigured-servicenow-configuration]]
==== {sn-itsm} connectors
The following example creates a <<servicenow-action-type,{sn-itsm} connector>> with basic authentication:
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-servicenow-connector-type
actionTypeId: .servicenow
config:
apiUrl: https://example.service-now.com/ <1>
usesTableApi: false <2>
secrets:
username: testuser <3>
password: passwordkeystorevalue <4>
--
<1> The ServiceNow instance URL.
<2> Specifies whether the connector uses the Table API or the Import Set API. If `usesTableApi` is `false`, the Elastic application should be installed in {sn}.
<3> The user name.
<4> The password. NOTE: This value should be stored in the <<creating-keystore, {kib} keystore>>.
The following example creates a {sn-itsm} connector with OAuth authentication:
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-oauth-servicenow-connector-type
actionTypeId: .servicenow
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
isOAuth: true <1>
userIdentifierValue: testuser@email.com <2>
clientId: abcdefghijklmnopqrstuvwxyzabcdef <3>
jwtKeyId: fedcbazyxwvutsrqponmlkjihgfedcba <4>
secrets:
clientSecret: secretsecret <5>
privateKey: -----BEGIN RSA PRIVATE KEY-----\nprivatekeyhere\n-----END RSA PRIVATE KEY----- <6>
--
<1> Specifies whether the connector uses basic or OAuth authentication.
<2> The user identifier.
<3> The client identifier assigned to your OAuth application.
<4> The key ID assigned to the JWT verifier map of your OAuth application.
<5> The client secret assigned to the OAuth application.
<6> The RSA private key. If it has a password, you must also provide `privateKeyPassword`.
[float]
[[preconfigured-servicenow-sir-configuration]]
==== {sn-sir} connectors
The following example creates a <<servicenow-sir-action-type,{sn-sir} connector>> with basic authentication:
[source,text]
--
xpack.actions.preconfigured:
my-servicenow-sir:
name: preconfigured-servicenow-connector-type
actionTypeId: .servicenow-sir
config:
apiUrl: https://example.service-now.com/ <1>
usesTableApi: false <2>
secrets:
username: testuser <3>
password: passwordkeystorevalue <4>
--
<1> The ServiceNow instance URL.
<2> Specifies whether the connector uses the Table API or the Import Set API. If `usesTableApi` is false, the Elastic application should be installed in {sn}.
<3> The user name.
<4> The password. NOTE: This value should be stored in the <<creating-keystore, {kib} keystore>>.
The following example creates a {sn-sir} connector with OAuth authentication:
[source,text]
--
xpack.actions.preconfigured:
my-servicenow:
name: preconfigured-oauth-servicenow-connector-type
actionTypeId: .servicenow-sir
config:
apiUrl: https://example.service-now.com/
usesTableApi: false
isOAuth: true <1>
userIdentifierValue: testuser@email.com <2>
clientId: abcdefghijklmnopqrstuvwxyzabcdef <3>
jwtKeyId: fedcbazyxwvutsrqponmlkjihgfedcba <4>
secrets:
clientSecret: secretsecret <5>
privateKey: -----BEGIN RSA PRIVATE KEY-----\nprivatekeyhere\n-----END RSA PRIVATE KEY----- <6>
--
<1> Specifies whether the connector uses basic or OAuth authentication.
<2> The user identifier.
<3> The client identifier assigned to the OAuth application.
<4> The key ID assigned to the JWT verifier map of your OAuth application.
<5> The client secret assigned to the OAuth application.
<6> The RSA private key. If it has a password, you must also specify
`privateKeyPassword`.
[float]
[[preconfigured-slack-configuration]]
==== Slack connectors
@ -605,7 +757,6 @@ xpack.actions.preconfigured:
NOTE: SSL authentication is not supported in preconfigured webhook connectors.
[float]
[[preconfigured-cases-webhook-configuration]]
==== {webhook-cm} connectors
@ -664,7 +815,7 @@ The following example creates an <<xmatters-action-type,xMatters connector>> wit
[source,text]
--
xpack.actions.preconfigured:
my-xmatters:
my-xmatters:
name: preconfigured-xmatters-connector-type
actionTypeId: .xmatters
config:

View file

@ -272,6 +272,7 @@ A configuration URL that varies by connector:
* For a <<jira-action-type,Jira connector>>, specifies the Jira instance URL.
* For an <<opsgenie-action-type,{opsgenie} connector>>, specifies the {opsgenie} URL. For example, `https://api.opsgenie.com` or `https://api.eu.opsgenie.com`.
* For a <<pagerduty-action-type,PagerDuty connector>>, specifies the PagerDuty event URL. Defaults to `https://events.pagerduty.com/v2/enqueue`.
* For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>> specifies the ServiceNow instance URL.
* For a <<swimlane-action-type,{swimlane} connector>>, specifies the {swimlane} instance URL.
NOTE: If you are using the `xpack.actions.allowedHosts` setting, make sure the hostname in the URL is added to the allowed hosts.
@ -285,7 +286,12 @@ An application ID that varies by connector:
--
`xpack.actions.preconfigured.<connector-id>.config.clientId`::
For an <<email-action-type,email connector>>, specifies a GUID format value that corresponds to the client ID, which is a part of OAuth 2.0 client credentials authentication.
A client identifier that varies by connector:
+
--
* For an <<email-action-type,email connector>>, specifies a GUID format value that corresponds to the client ID, which is a part of OAuth 2.0 client credentials authentication.
* For a <<servicenow-itom-action-type,{sn-itom}>>, <<servicenow-action-type,{sn-itsm}>>, or <<servicenow-sir-action-type,{sn-sir} connector>> specifies the client identifier assigned to the OAuth application.
--
`xpack.actions.preconfigured.<connector-id>.config.configUrl`::
For an <<xmatters-action-type,xMatters connector>> with basic authentication, specifies the request URL for the Elastic Alerts trigger in xMatters.
@ -350,6 +356,12 @@ For an <<email-action-type,email connector>>, specifies the host name of the ser
`xpack.actions.preconfigured.<connector-id>.config.index`::
For an <<index-action-type,index connector>>, specifies the {es} index.
`xpack.actions.preconfigured.<connector-id>.config.isOAuth`::
For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies whether to use basic or OAuth authentication.
`xpack.actions.preconfigured.<connector-id>.config.jwtKeyId`::
For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies the key ID assigned to the JWT verifier map of your OAuth application. It is required when `xpack.actions.preconfigured.<connector-id>.config.isOAuth` is `true`.
`xpack.actions.preconfigured.<connector-id>.config.mappings`::
For a <<swimlane-action-type,Swimlane connector>>, specifies field mappings.
@ -427,9 +439,16 @@ A configuration URL that varies by connector:
NOTE: If you are using the `xpack.actions.allowedHosts` setting, make sure this hostname is added to the allowed hosts.
--
`xpack.actions.preconfigured.<connector-id>.config.userIdentifierValue`::
For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies the user identifier. It is required when required when `xpack.actions.preconfigured.<connector-id>.config.isOAuth` is `true`.
`xpack.actions.preconfigured.<connector-id>.config.usesBasic`::
For an <<xmatters-action-type,xMatters connector>>, specifies whether it uses HTTP basic authentication. Defaults to `true`.
`xpack.actions.preconfigured.<connector-id>.config.usesTableApi`::
For a <<servicenow-action-type,{sn-itsm}>> or <<servicenow-sir-action-type,{sn-sir} connector>>, specifies whether the connector uses the Table API or the Import Set API.
If set to `false`, the Elastic application should be installed in ServiceNow.
`xpack.actions.preconfigured.<connector-id>.config.viewIncidentUrl`::
For a <<cases-webhook-action-type,{webhook-cm} connector>>, specifies a URL string with either the external service ID or external service title Mustache variable to view a case in the external system.
@ -466,6 +485,7 @@ A client secret that varies by connector:
+
--
* For an <<email-action-type,email connector>>, specifies the client secret that you generated for your app in the app registration portal. It is required when the email service is `exchange_server`, which uses OAuth 2.0 client credentials authentication.
* For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies the client secret assigned to the OAuth application. It is required when `xpack.actions.preconfigured.<connector-id>.config.isOAuth` is `true`.
NOTE: The client secret must be URL-encoded.
--
@ -482,10 +502,18 @@ An email address that varies by connector:
A password secret that varies by connector:
+
--
* For an <<email-action-type,email>>, <<webhook-action-type,webhook>>, or <<cases-webhook-action-type,{webhook-cm} connector>>, specifies a password that is required when `xpack.actions.preconfigured.<connector-id>.config.hasAuth` is `true`.
* For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies a password that is required when `xpack.actions.preconfigured.<connector-id>.config.isOAuth` is `false`.
* For an <<xmatters-action-type,xMatters connector>>, specifies a password that is required when `xpack.actions.preconfigured.<connector-id>.config.usesBasic` is `true`.
--
`xpack.actions.preconfigured.<connector-id>.secrets.privateKey`::
For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies the RSA private key. It is required when `xpack.actions.preconfigured.<connector-id>.config.isOAuth` is `true`.
`xpack.actions.preconfigured.<connector-id>.secrets.privateKeyPassword`::
For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies the password for the RSA private key.
`xpack.actions.preconfigured.<connector-id>.secrets.routingKey`::
For a <<pagerduty-action-type,PagerDuty connector>>, specifies the 32 character PagerDuty Integration Key for an integration on a service, also referred to as the routing key.
@ -523,6 +551,9 @@ For a <<slack-action-type,Slack connector>>, specifies the Slack webhook URL.
NOTE: If you are using the `xpack.actions.allowedHosts` setting, make sure the hostname is added to the allowed hosts.
--
`xpack.actions.preconfigured.<connector-id>.secrets.username`::
For a <<servicenow-action-type,{sn-itsm}>>, <<servicenow-sir-action-type,{sn-sir}>>, or <<servicenow-itom-action-type,{sn-itom} connector>>, specifies a user name that is required when `xpack.actions.preconfigured.<connector-id>.config.isOAuth` is `false`.
[float]
[[alert-settings]]
=== Alerting settings