IBM X-Force Exchange is a threat intelligence sharing platform that you can use to research security threats, to aggregate intelligence, and to collaborate with peers.
Emit new event when you add or modify a new row in a table. See the docs here
Emit new event when new rows are returned from a custom query. See the docs here
Emit new event when a new table is added to a database. See the docs here
The IBM X-Force Exchange API offers a comprehensive threat intelligence database, allowing users to access risk scores, reports, and historical data on various threats. With Pipedream, you can automate workflows involving threat analysis, monitoring, and response. By leveraging its capabilities, you can streamline security operations, such as fetching threat intelligence, updating threat databases, and alerting based on specific indicators of compromise (IOCs).
import { axios } from "@pipedream/platform"
export default defineComponent({
props: {
ibm_x_force_exchange: {
type: "app",
app: "ibm_x_force_exchange",
}
},
async run({steps, $}) {
return await axios($, {
url: `https://api.xforce.ibmcloud.com/api/user/profile`,
auth: {
username: `${this.ibm_x_force_exchange.$auth.api_key}`,
password: `${this.ibm_x_force_exchange.$auth.api_password}`,
},
})
},
})
The MySQL application on Pipedream enables direct interaction with your MySQL databases, allowing you to perform CRUD operations—create, read, update, delete—on your data with ease. You can leverage these capabilities to automate data synchronization, report generation, and event-based triggers that kick off workflows in other apps. With Pipedream's serverless platform, you can connect MySQL to hundreds of other services without managing infrastructure, crafting complex code, or handling authentication.
import mysql from '@pipedream/mysql';
export default defineComponent({
props: {
mysql,
},
async run({steps, $}) {
// Component source code:
// https://github.com/PipedreamHQ/pipedream/tree/master/components/mysql
const queryObj = {
sql: "SELECT NOW()",
values: [], // Ignored since query does not contain placeholders
};
return await this.mysql.executeQuery(queryObj);
},
});