Skip to content

Commit f1d40d7

Browse files
committed
Update Blog “integrating-hpe-greenlake-webhooks-with-splunk”
1 parent f3d1c6f commit f1d40d7

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

content/blog/integrating-hpe-greenlake-webhooks-with-splunk.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The [HTTP Event Collector (HEC)](https://dev.splunk.com/enterprise/docs/devtools
4646

4747
HPE GreenLake implements robust security measures to ensure webhook authenticity:
4848

49-
* Challenge Request Validation: After registering a webhook, a verification challenge is sent to the destination (the webhook URL). The event type is hpe.greenlake.events.v1beta1.webhooks.verification. The challenge request includes a unique, random string generated by the server that is sent in the body as a payload.
49+
* Challenge Request Validation: After registering a webhook, a verification challenge is sent to the destination (the webhook URL). The event type is `hpe.greenlake.events.v1beta1.webhooks.verification`. The challenge request includes a unique, random string generated by the server that is sent in the body as a payload.
5050
* HMAC SHA-256 Signature Verification: HPE GreenLake webhooks use a verification challenge process to ensure that webhook connections are legitimate and secure. HPE GreenLake secures webhook notifications through HMAC (Hash-based Message Authentication Code) with SHA-256, a cryptographic hashing algorithm.
5151
* Shared Secret Management: The platform supports dual secret rotation for zero-downtime security updates.
5252

@@ -68,7 +68,7 @@ Challenge Request Example:
6868

6969
## Challenges and solutions
7070

71-
The primary challenge in integrating HPE GreenLake webhooks with Splunk HEC lies in the webhook verification process. The destination must read the value from the challengeRequest field and create an HMAC SHA-256 hash, using the webhook secret as salt and the challengeRequest value as a string to hash. When successful, the destination responds with a JSON object with the format {"verification": "CREATED_HASH"} and a HTTP 200 OK status.
71+
The primary challenge in integrating HPE GreenLake webhooks with Splunk HEC lies in the webhook verification process. The destination must read the value from the challengeRequest field and create an HMAC SHA-256 hash, using the webhook secret as salt and the challengeRequest value as a string to hash. When successful, the destination responds with a JSON object with the format `{"verification": "CREATED_HASH"}` and a HTTP 200 OK status.
7272

7373
### A challenge
7474

@@ -331,7 +331,6 @@ The complete integration flow works as follows:
331331
> Note: See [this blog](https://developer.hpe.com/blog/getting-started-with-the-hpe-greenlake-cloud-eventing-framework/) to learn how to register a new webhook handler in HPE GreenLake
332332
333333
2. Webhook handler verification process
334-
335334
3. Event processing flow
336335
337336
* HPE GreenLake sends event data to the custom handler endpoint.

0 commit comments

Comments
 (0)