When integrated with CoreStack, policy violations identified in CoreStack can be created as incidents in the selected Jira Project. This is useful if you have Jira ServiceDesk as the Incident Management tool for your team and would prefer to use that as the centralized system to capture and resolve incidents.

How to On-board

Navigate to Settings > Integrated Tools

Look for JIRA ServiceDesk in the Left panel under the ITSM Category.

Click on “Add Account” option in the right side to go to JIRA on-boarding page.

The on-boarding process has 3 steps shown as 3 tabs in the page:

  1. Authentication
  2. Tools Configuration
  3. Authorization

Authentication

Please keep the following information ready:

  1. Username for your Jira ServiceDesk account. It is recommended to create a separate user for this integration.
  2. Auth URL: This is your Jira login URL. Typically in the format as https://<org_name>.atlassian.net
  3. API Token: Create an API Token for CoreStack to connect to Jira (Instructions below)
    a. You can create an API Token from your Atlassian Profile. Use the direct link
    (https://id.atlassian.com/manage-profile/security/api-tokens)  or navigate from profile page as given below.
    i. Navigate to Profile page (https://id.atlassian.com/manage-profile)
    ii. Select “Security” from the left menu

    iii. You will see API Token in the right side as shown below
    iv. Click on the “Create and manage API tokens” link.
    b. Once you are at the page, click on “Create API Token”
    c. Provide a meaningful label such as “CoreStack_App” and click on create
    d. Your API Token will be created, and you will see token displayed. Click on the “Copy”
    button to copy the token to clipboard and keep it ready.Once you have the above 3 values handy, you can start the on-boarding process.

The other fields required are similar to any cloud or tool account. They include

Account Name: Any friendly and meaningful name for the Jira account

Description: Optional description about the Jira account

Environment: Choose Dev / Test / Prod as applicable

Scope: Choose Tenant if all users in the CoreStack Tenant can access this account. Choose Private if you would like this account accessible only by you.

Once you have entered all the above information and ticked the checkbox for Privacy Policy, you can click on “Next” at top right to go to the next step.

JIRA Tools Configuration

These settings are required to help CoreStack decide on the right information to use while creating the incident tickets.

  1. Project name: Choose from the list of projects in the dropdown. This list is fetched from your Jira account. This is the project all incidents created from CoreStack will be mapped to.
  2. Description: CoreStack can add some relevant information about the incident while creating the ticket. You can choose from the available fields such as Resource Name, Resource Id or Resource Type.
  3. Summary: This is a standard text to be used in the ticket summary, so that it is identifiable as tickets created from CoreStack.
  4. Assignee: Can choose the user to which the violation incident will get assigned.

Authorization

This is the last step in the onboarding process. The list of Roles in CoreStack for this Tenant will be displayed. You need to select the Roles that can have access to this Integrated Jira account. However the level of access will depend on the role.

After selecting the roles, you can click on the “Finish” button to complete the process.

You can come back and view/edit the settings of the Jira account from the same page: Settings > Integrated Tools > Jira.

Click on the account to view the settings already provided. You will see the details of the account as shown below:

If you need to modify the settings, click on the 3 dots menu at right end to select “Edit” and modify any of the settings. The process is very similar to the onboarding steps explained above.

Tenant Level Configuration

After the account is successfully onboarded into CoreStack, you also need to configure which alerts to send to Jira and the relevant settings. The instructions as provided below:

1. Navigate to Settings > Tenants
Select your Tenant on the Left panel and then look for “Activity Queue Settings” on the right panel. Expand this section and select the Jira account from the dropdown. There are multiple activities happening in CoreStack and the destination for each of the activity such as monitoring alerts, Template failures, Policy violations etc. can be different Tools onboarded to CoreStack.

In this example, we are mapping the newly onboarded Jira account for Policies as shown below:

Next, you need to select “Configuration Management” and then map tick the checkbox under “Policy” for ITSM Change Management.

Use Cases

As mentioned above, you could have Policy Violations routed to Jira ServiceDesk as tickets.

You can simulate a condition to test this:

Example: Select “Policies” module from Left Navigation Menu and then search for the Policy “AWS Security Group Port Violation Policy”.

Execute the Policy:

This Policy is to check for port(s) opened with CIDR block 0.0.0.0/0 in an AWS account. Port(s) can be specified when executing the policy Use case(s): Can be used to identify if SSH/RDP/DB port is opened to
public.

You can run the policy on-demand to check for the selected account and region. Provide the input parameters requested and click on “Run” button at top right. Once the policy execution is initiated, you will be redirected to the Job History page where you can see the status of the job execution.

On the left side you have all the jobs recently executed. You can select the right policy to be checked. You can then view the Input parameters provided and the Execution Logs for the policy.

View Incidents in Jira:

Navigate to the specific Jira Project that was provided during the Tenant level configuration. You must be able to view any tickets created for Policy violations. If required you can search by the assignee / summary description provided.

Use Cases Covered:

For new policy violation, queue message comes with mode create and an incident will be created in JIRA with the given request body under selected Service Desk project.

For the same violation, queue message comes with mode update and the same incident gets updated every time with policy violation’s ‘updated_at’ in the incident comment.

Note: Only when existing incident contain ‘target_reference_id’ with incident key in collection When new violation occurs but failed to create incident for that violation and the same violation with update mode considered to be create mode until the incident gets created.

When the same policy violation occurs with different input, its queue message comes with create mode and new incident gets created.

When two different policies have run for same resource and their ‘resource_id’ may be the same but they are differentiated with mode create and update in the queue messages.