# Monitoring

OpenText Core SCA automation policies normally trigger based on pipeline events, such as committing a code to a repository. When the source code is committed, a OpenText Core SCA scan starts and automations run. However, in some cases, you might want to use automations to check the status of a repository even if you have not made any changes to it. For example, new vulnerabilities might be discovered for dependencies in repositories that are not updated regularly. Monitoring allows you to get timely warnings about issues in such repositories by automatically and periodically checking the rules regardless of pipeline events. It is possible to configure monitored automations to either result in webhooks or emails when triggered.

To enable monitoring for a new rule, follow these steps:

1. From a repository page, go to the **Automations** tab. On the Automations page, you can view the list of automation rules created.

<figure><img src="/files/oODlooDH9SBotlyW0FgV" alt=""><figcaption></figcaption></figure>

2. On the Automations page, click **New** -> **Add rule**. The Add a new rule page is displayed.

<figure><img src="/files/vX4bnMfQ4olX6gFjfnh7" alt=""><figcaption></figcaption></figure>

3. On the Add a new rule page, select the valid vulnerability condition from the drop-down. The vulnerability condition must be either 'CVSS' or 'discovery date' or both.
4. Select the valid trigger events from the drop-down. The trigger events must be either 'notify by email', 'notify user groups by email' or 'trigger webhook'.
5. Click **Enable monitoring** check box to enable the monitoring for the rule.&#x20;
6. Click **Generate rule** and review any warnings (if applicable).&#x20;
7. Click **Save**.

{% hint style="info" %}
When the monitoring is enabled for a rule, on the Automations page, you can view the ![](/files/ksu8sNLIP6yU4Fh4j3cq) icon next to the rule.
{% endhint %}

To enable monitoring for an existing rule, follow these steps:

1. From a repository page, go to the **Automations** tab. On the Automations page, you can view the list of automation rules created.
2. Click the **… (three dots)** on the right-hand side of the rule.
3. Select **Edit rule.**

<figure><img src="/files/53lSlcy81zqVpzUVQxT6" alt=""><figcaption></figcaption></figure>

4. On the Edit rule page, select the valid vulnerability condition from the drop-down. The vulnerability condition must be either 'CVSS' or 'discovery date' or both.
5. Select the valid trigger events from the drop-down. The trigger events must be either 'notify by email', 'notify user groups by email' or 'trigger webhook'.
6. Click **Enable monitoring** check box to enable the monitoring for the rule.
7. Click **Generate rule** and review any warnings (if applicable).&#x20;
8. Click **Save**.

To filter the rules, follow these steps:

1. From a repository page, go to the **Automations** tab. On the Automations page, you can view the list of automation rules created.

<figure><img src="/files/oODlooDH9SBotlyW0FgV" alt=""><figcaption></figcaption></figure>

2. On the Automations page, click **filter**. The Filter by page is displayed.

<figure><img src="/files/5JeBRgJ1mNM1JJdIjq5t" alt=""><figcaption></figcaption></figure>

3. On the Filter by page, select the appropriate values to filter the rules. You can filter the rules based on:
   * Activation: The values are 'Active' and 'Inactive'.
   * Action: The values are 'Fail pipeline', 'Pipeline warning', 'Notify by email', 'Mark as unaffected', 'Flag as vulnerable' and 'Trigger webhook'.
   * Monitoring: The values are 'Enabled' and 'Disabled'.
   * Default rules: The values are 'Default rules' and 'Non default rules'.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.debricked.com/product/automation/monitoring.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
