In addition to native connectors to third-party business applications, Stigg can notify any application about changes that take place on the Stigg platform by triggering webhook events.
The receiving application will then need to catch the webhook event and process it.
The list of available webhooks is available under the Settings > Integrations > Webhooks section.
To add a webhook, click on the ”+ New webhook” button from the webhook list screen.
In the opened modal enter the following details:
Click “Add” to confirm the action.
Created webhooks are immediately activated; that is, Stigg will start streaming events to them immediately after they’re created. To disable sending of events to a specific webhook, see the “Disabling webhooks” section.
To view the details of specific webhook, click on the relevant row in the webhook list screen.
Stigg will include a webhook secret in the header of sent events. Use this value to validate that requests to the defined endpoint URL originate from Stigg.
In order to test the webhook integration, it’s possible to trigger a test event.
To do so, click on the dotted menu icon of the relevant event, select the “Send test event” action.
Click on “Send test event” to confirm the action.
In the opened modal it’s possible to see the request body and response from the configured endpoint.
To verify that the event was sent by Stigg you can validate the secret in the header.
Each webhook event you receive contains the webhook secret in the header under the Stigg-Webhooks-Secret
property:
In order to verify that the event was sent by Stigg simply make sure that the webhook secret you receive in the header matches the webhook secret from the webhook details page:
Support for webhook validation using HMAC signatures is in our roadmap.
Stigg does not guarantee delivery of events in the order in which they’re reported. Your endpoint shouldn’t expect delivery of these events in a specific order, and needs to handle their delivery accordingly.
When additional data is required, you can leverage the Stigg API and SDKs to fetch it.
Stigg requires that all webhooks events return a successful HTTP response (2XX) within 30 seconds.
If the request returns an error or times out, Stigg will automatically retry to send the webhook event according to the below logic:
If Stigg doesn’t receive a successful response after this schedule, the event is considered as failed.
Webhook events are stored in the Stigg backend and can be resent upon request.
Stigg regularly monitors webhook delivery failures and will actively reach to you in case there are failures. A self-served log of webhook events is on our roadmap.
To prevent processing the same event multiple times, utilize the messageId
field provided in each webhook event. This unique identifier ensures idempotency by allowing you to track and ignore duplicate events.
When your system receives a webhook, check the messageId
against previously processed IDs. If the messageId
has already been processed, discard the event to avoid redundant operations.
Webhook events may originate from the following IP addresses:
This list may change. We’ll notify you when it does.
To edit the webhook’s endpoint URL and description:
To edit the list of events that are sent to the endpoint:
It’s also possible to remove a specific event from the list of sent events by clicking on the dotted menu icon of the relevant event, selecting the “Remove” action, and confirming the action.
To stop sending events to a specific webhook, while still keeping the webhook configuration, set the toggle that appears under the webhook details section to “Disabled”.
Confirm the action in the opened modal.
Any events that take place on the Stigg platform will not be send to disabled webhooks. It’s also not possible to replay missed events after the webhook is activated again.
Once you’re ready to start sending events again to the webhook, set the toggle that appears under the webhook details section to “Active”.
To delete a configured webhook:
In addition to native connectors to third-party business applications, Stigg can notify any application about changes that take place on the Stigg platform by triggering webhook events.
The receiving application will then need to catch the webhook event and process it.
The list of available webhooks is available under the Settings > Integrations > Webhooks section.
To add a webhook, click on the ”+ New webhook” button from the webhook list screen.
In the opened modal enter the following details:
Click “Add” to confirm the action.
Created webhooks are immediately activated; that is, Stigg will start streaming events to them immediately after they’re created. To disable sending of events to a specific webhook, see the “Disabling webhooks” section.
To view the details of specific webhook, click on the relevant row in the webhook list screen.
Stigg will include a webhook secret in the header of sent events. Use this value to validate that requests to the defined endpoint URL originate from Stigg.
In order to test the webhook integration, it’s possible to trigger a test event.
To do so, click on the dotted menu icon of the relevant event, select the “Send test event” action.
Click on “Send test event” to confirm the action.
In the opened modal it’s possible to see the request body and response from the configured endpoint.
To verify that the event was sent by Stigg you can validate the secret in the header.
Each webhook event you receive contains the webhook secret in the header under the Stigg-Webhooks-Secret
property:
In order to verify that the event was sent by Stigg simply make sure that the webhook secret you receive in the header matches the webhook secret from the webhook details page:
Support for webhook validation using HMAC signatures is in our roadmap.
Stigg does not guarantee delivery of events in the order in which they’re reported. Your endpoint shouldn’t expect delivery of these events in a specific order, and needs to handle their delivery accordingly.
When additional data is required, you can leverage the Stigg API and SDKs to fetch it.
Stigg requires that all webhooks events return a successful HTTP response (2XX) within 30 seconds.
If the request returns an error or times out, Stigg will automatically retry to send the webhook event according to the below logic:
If Stigg doesn’t receive a successful response after this schedule, the event is considered as failed.
Webhook events are stored in the Stigg backend and can be resent upon request.
Stigg regularly monitors webhook delivery failures and will actively reach to you in case there are failures. A self-served log of webhook events is on our roadmap.
To prevent processing the same event multiple times, utilize the messageId
field provided in each webhook event. This unique identifier ensures idempotency by allowing you to track and ignore duplicate events.
When your system receives a webhook, check the messageId
against previously processed IDs. If the messageId
has already been processed, discard the event to avoid redundant operations.
Webhook events may originate from the following IP addresses:
This list may change. We’ll notify you when it does.
To edit the webhook’s endpoint URL and description:
To edit the list of events that are sent to the endpoint:
It’s also possible to remove a specific event from the list of sent events by clicking on the dotted menu icon of the relevant event, selecting the “Remove” action, and confirming the action.
To stop sending events to a specific webhook, while still keeping the webhook configuration, set the toggle that appears under the webhook details section to “Disabled”.
Confirm the action in the opened modal.
Any events that take place on the Stigg platform will not be send to disabled webhooks. It’s also not possible to replay missed events after the webhook is activated again.
Once you’re ready to start sending events again to the webhook, set the toggle that appears under the webhook details section to “Active”.
To delete a configured webhook: