Prisma Cloud Application Security: Steps needed to reintegrate the repository with the correct PR functionality?
4074
Created On 04/27/23 09:02 AM - Last Modified 01/24/24 21:54 PM
Objective
- You successfully integrated your repository,
- Enforcement rules for PR comments doesn't work
- All repo's are added and visible within the IaC Misconfiguration tab within Prisma Cloud:
Example of not working environment:
Example of working environment:
- It seems that the integration between Prisma Cloud and Azure was done by a user who does not have sufficient permissions to perform the necessary tasks.
Environment
- Prisma Cloud
- Azure
Procedure
To resolve:
- Remove all the repo's from the affected DevOps project in Prisma,
- Assign the service principal the 'Project Administrator' role to the DevOps project,
- Re-add the repositories,
- Confirm the webhooks are created,
- Remove the Project Administrator role from the principal.
Then, they can proceed to enter the service hooks section, where they should see two lines for both created and updated events for each integrated repository.
Repositories selection in Prisma modal, the subscription should be done within 1-2 min.
Additional Information
View our Prisma Cloud Application Security reportistories here.