Skip to content

MS Teams Notifications

MS Teams Notifications: Real-Time Network Configuration Alerts for rConfig V8

Section titled “MS Teams Notifications: Real-Time Network Configuration Alerts for rConfig V8”

MS Teams Notifications enable rConfig V8.2 to send real-time alerts and updates directly to your MS Teams channels. This integration keeps your team informed of important network events, configuration changes, and system activities without requiring constant monitoring of the rConfig interface.

rConfig V8 can send the following notifications to MS Teams:

Notification TypeDescriptionAvailability
Configuration ChangesAlerts when device configurations are modifiedrConfig V8+
SNMP TrapsNotifications when SNMP traps are receivedrConfig V8+

Before configuring MS Teams notifications, ensure you have:

  • Active MS Teams workspace with administrative access
  • Ability to create and install MS Teams apps
  • Channel(s) designated for rConfig notifications
  • Administrator access to rConfig V8

In order to receive notifications in MS Teams, you need to create a webhook URL and worflow for the integration. Information on how to do this can be found in the Microsoft documentation: Create an Incoming Webhook. If you have any issues setting up the webhook, please reach out to your Azure/ O365 support Admin for assistance.

Hint: Most O365 Environments will have a Power Platform DLP that disables the use of custom connectors. Contact your O365 Admin to allow the use of custom connectors for the rConfig integration. Specifically, the When a Teams webhook request is received connector must be allowed for the integration to work.

Open the rConfig .env file:

Terminal window
vim /var/www/html/rconfig8/current/.env

Add or update the following lines:

Terminal window
# Slack Integration
TEAMS_ENABLED=false
TEAMS_WEBHOOK_URL=

Configuration Parameters:

  • TEAMS_ENABLED: Set to true to enable MS Teams notifications
  • TEAMS_WEBHOOK_URL: Webhook URL from MS Teams app

Save the file and clear the rConfig cache:

Terminal window
php /var/www/html/rconfig8/current/artisan rconfig:clear-all

Navigate to Settings > Integrations > MS Teams Notifications in the rConfig interface.

Select which events should trigger MS Teams notifications:

  • ✓ Configuration changes detected
  • ✓ SNMP traps received

Step 3: Configure Channel Routing (Optional)

Section titled “Step 3: Configure Channel Routing (Optional)”

Specify different channels for different notification types:

  • Configuration changes → #network-changes
  • SNMP traps → #snmp-alerts

Click Send Test Message to verify the integration is working correctly.

Expected test message in Slack:

🔔 rConfig Test Notification
This is a test message from rConfig V8.
Integration is working correctly!
📝 Configuration Change Detected
Device: core-router-01.example.com
Type: Cisco IOS
Changed: 2025-10-14 10:23:15 UTC
View Details: https://rconfig.example.com/devices/123/configs/456
🚨 SNMP Trap Received
Device: edge-switch-02.example.com
Type: Link Down
Received: 2025-10-14 11:45:30 UTC
View Details: https://rconfig.example.com/devices/456/snmp-traps/789

Check MS Teams app installation:

Hint: In our lab, we had to add the MS Teams, and MS Teams Webhook connectors to the allowed Business connectors list in the Power Platform DLP settings for the integration to work.

Verify rConfig configuration:

Terminal window
# Check if MS Teams is enabled
grep TEAMS_ENABLED /var/www/html/rconfig8/current/.env
# Verify webhook URL format
grep TEAMS_WEBHOOK_URL /var/www/html/rconfig8/current/.env

Check rConfig logs:

Terminal window
tail -50 /var/www/html/rconfig8/current/storage/logs/laravel.log | grep -i teams

Protect bot token: Never commit the bot token to version control or share it publicly. Store it securely in the .env file.

Use signing secret: Enable webhook signature verification using the signing secret to prevent unauthorized message sending.

Restrict permissions: Grant only the minimum required scopes to the MS Teams app.

Monitor token usage: Regularly review MS Teams app audit logs for suspicious activity.

Channel access control: Use private channels for sensitive notifications and carefully manage channel membership.

Organize channels: Create dedicated channels for different notification types (e.g., #network-changes, #compliance-alerts).

Use threading: Configure notifications to use threads for related events to reduce channel clutter.

Set notification schedules: Consider limiting non-critical notifications to business hours.

Test regularly: Periodically send test messages to ensure the integration remains functional.

Document channel purposes: Clearly communicate to team members which channels receive which notification types.