06 Apr 2017 05:32 PM - last edited on 20 May 2021 09:10 AM by MaciejNeumann
We are attempting to configure our DT SaaS Managed instance to send alerts to HPOV via a custom webhook. We are able to successfully test the exposed interface, but when we configure the webhook in DTSaaS we are receiving the following error.
2017-04-06 16:12:53 UTC WARNING [<default,1rqyj3bmqj,tab-ylYczhMf974w>] [IntegrationConfigServiceImpl] POTENTIAL HACK ATTEMPT: user tried to configure a forbidden URL as Webhook endpoint: https://<HPOVendpoint>/api/om/opcmsg
I am wondering if we are receiving this error due to a certificate issue or if DTSaaS is blocking the request because we are pointing to a host directly as opposed to a VIP/DNS alias.
Thank you for your help.
Regards,
Shawn Givan
Solved! Go to Solution.
07 Apr 2017 07:50 AM
Yes it seems that our detection of misuse of the webhook in private network space was a little too strict. I will ask our devs if we have some sort of whitelist in place.
08 Jun 2017 03:33 PM
Wolfgang,
Do you know if there has been any movement on this? Or do you need an RFE?
Regards,
Shawn Givan
10 Apr 2017 03:14 PM
Wolfgang,
Awesome. Thank you.
Regards,
Shawn Givan