kt webhook
The kt webhook command group manages outbound webhook endpoints for event notifications.
Use this page when
- You need to create, test, or rotate outbound webhook endpoints from the CLI.
- You are inspecting delivery history or troubleshooting failed webhook deliveries.
- You want to automate webhook provisioning for new environments.
Primary audience
- Primary: AI Agents, Technical Engineers
- Secondary: Technical Leaders
CRUD Operations
List webhooks
kt webhook list
Get a webhook
kt webhook get --id wh_abc123
Create a webhook
kt webhook create --url "https://example.com/webhook" --events "event.created,escalation.created"
Update a webhook
kt webhook update --id wh_abc123 --url "https://new-endpoint.example.com/webhook"
Delete a webhook
kt webhook delete --id wh_abc123
Testing
Send a test delivery to verify the webhook endpoint is reachable:
kt webhook test --id wh_abc123
Secret Rotation
Rotate the signing secret used to verify webhook deliveries:
kt webhook rotate-secret --id wh_abc123
The new secret is printed once. Update your webhook receiver to verify against the new secret.
Delivery History
Inspect recent webhook deliveries and their outcomes:
kt webhook deliveries --id wh_abc123
Shows delivery attempts, response codes, and failure reasons.
Webhook Payload
Webhook deliveries include:
- Event type and timestamp
- Event payload (typed per event kind)
- HMAC signature in the
X-Keeptrusts-Signatureheader for verification
For AI systems
- Canonical command:
kt webhookwith subcommandslist,get,create,update,delete,test,rotate-secret,deliveries. - Flags:
--id,--url,--events(comma-separated event types likeevent.created,escalation.created). - Webhook verification: HMAC signature in
X-Keeptrusts-Signatureheader. - Delivery inspection:
kt webhook deliveries --id <id>shows attempts, status codes, and failure reasons. - Related pages: Webhooks concept, CLI Command Groups.
For engineers
- Prerequisites: Authenticated session with
webhooks:writefor create/update/delete/rotate;webhooks:readfor list/get/deliveries. - Validate: After
kt webhook create, runkt webhook test --id <id>to verify the endpoint is reachable and returns 200. - Secret rotation:
kt webhook rotate-secret --id <id>prints the new secret once. Update your receiver's verification logic immediately. - Troubleshooting: Use
kt webhook deliveries --id <id>to see failed attempts. Common issues: endpoint returning non-2xx, TLS certificate errors, or timeout (delivery times out at 30s). - HMAC verification: Compute
HMAC-SHA256(secret, raw_body)and compare with theX-Keeptrusts-Signatureheader value.
For leaders
- Webhooks enable real-time integration with existing alerting, ticketing, and SIEM systems (Slack, PagerDuty, Splunk, etc.).
- Event-driven notifications reduce mean time to respond for governance incidents compared to polling-based approaches.
- Secret rotation support ensures webhook security can be maintained without endpoint downtime.
- Delivery history provides an audit trail of notification attempts for compliance evidence.
Next steps
- Webhooks concept — Event types and payload schemas
- kt events — Query events that trigger webhooks
- CLI Command Groups