Webhook endpoints
Each webhook receives a unique HTTPS URL and optional authentication requirements. When a caller posts to the URL, Planasonix validates the request, enqueues a run, and returns a correlation ID you can trace in run history.Create a webhook trigger
In pipeline orchestration settings, choose Webhook, name the trigger, and select the target pipeline and branch or version if your workspace uses environments.
Copy the endpoint URL
Store the URL in your secret manager; treat it like a capability URL—anyone who can invoke it may incur compute cost.
Security (signing)
Signed webhooks include a shared secret or asymmetric key verification:- Planasonix adds a signature header (for example,
X-Planasonix-Signatureor HMAC-SHA256 per product docs) over the raw body. - Your caller includes the same secret to generate the signature, or you verify using a published public key.
- Reject requests when timestamps skew beyond a short tolerance to block replayed payloads.
Payload parsing
Webhooks often carry JSON metadata your pipeline reads at runtime:export_id or location without hard-coding. Validate required keys early; return 400-class responses only when your webhook configuration documents strict schemas—otherwise failed runs may be clearer than rejected HTTP calls.
Large payloads
Large payloads
Prefer passing pointers (URIs) rather than embedding megabyte blobs in webhook bodies.
Retries
Retries
Callers may retry on timeouts. Make downstream processing idempotent so duplicate deliveries do not corrupt results.
Related topics
Triggers
Cloud-native event alternatives.
API keys
Programmatic authentication beyond webhooks.