A team admin can create and manage automations for the team’s projects, as well as components of their automations, such as webhooks, secrets, or Slack connections. Refer to Team settings.
To create a registry automation, you must have access to the registry. Refer to Configure Registry access.
To create a Slack automation, you must have permission to post to the Slack instance and channel you select.
Create an automation
Create an automation from the project or registry’s Automations tab. At a high level, to create an automation, follow these steps:
If necessary, create a W&B secret for each sensitive string required by the automation, such as an access token, password, or SSH key. Secrets are defined in your Team Settings. Secrets are most commonly used in webhook automations.
Configure the webhook or Slack notification to authorize W&B to post to Slack or run the webhook on your behalf. A single automation action (webhook or Slack notification) can be used by multiple automations. These actions are defined in your Team Settings.
In the project or registry, create the automation, which specifies the event to watch for and the action to take (such as posting to Slack or running a webhook). When you create a webhook automation, you configure the payload it send.
A team admin can add a Slack destination to the team.
Log in to W&B and go to Team Settings page.
In the Slack channel integrations section, click Connect Slack to add a new Slack instance. To add a channel for an existing Slack instance, click New integration.
If necessary, sign in to Slack in your browser. When prompted, grant W&B permission to post to the Slack channel you select. Read the page, then click Search for a channel and begin typing the channel name. Select the channel from the list, then click Allow.
In Slack, go to the channel you selected. If you see a post like [Your Slack handle] added an integration to this channel: Weights & Biases, the integration is configured correctly.
Now you can create an automation that notifies the Slack channel you configured.
View and manage Slack connections
A team admin can view and manage the team’s Slack instances and channels.
Log in to W&B and go to Team Settings.
View each Slack destination in the Slack channel integrations section.
Delete a destination by clicking its trash icon.
Create an automation
After you connect your W&B team to Slack, select Registry or Project, then follow these steps to create an automation that notifies the Slack channel.
A Registry admin can create automations in that registry.
Log in to W&B.
Click the name of a registry to view its details,
To create an automation scoped to the registry, click the Automations tab, then click Create automation. An automation that is scoped to a registry is automatically applied to all of its collections (including those created in the future).
To create an automation scoped only to a specific collection in the registry, click the collection’s action ... menu, then click Create automation. Alternatively, while viewing a collection, create an automation for it using the Create automation button in the Automations section of the collection’s details page.
Fill in any additional fields that appear, which depend upon the event. For example, if you select An artifact alias is added, you must specify the Alias regex.
Fill in any additional fields that appear, which depend upon the event. For example, if you select An artifact alias is added, you must specify the Alias regex.
At a high level, to create a webhook automation, you take these steps:
If necessary, create a W&B secret for each sensitive string required by the automation, such as an access token, password, or SSH key. Secrets are defined in your team settings.
Create a webhook to define the endpoint and authorization details and grant the integration access to any secrets it needs.
Create the automation to define the event to watch for and the payload W&B will send. Grant the automation access to any secrets it needs for the payload.
Create a webhook
A team admin can add a webhook for the team.
If the webhook requires a Bearer token or its payload requires a sensitive string, create a secret that contains it before creating the webhook. You can configure at most one access token and one other secret for a webhook. Your webhook’s authentication and authorization requirements are determined by the webhook’s service.
Log in to W&B and go to Team Settings page.
In the Webhooks section, click New webhook.
Provide a name for the webhook.
Provide the endpoint URL for the webhook.
If the webhook requires a Bearer token, set Access token to the secret that contains it. When using the webhook automation, W&B sets the Authorization: Bearer HTTP header to the access token, and you can access the token in the ${ACCESS_TOKEN}payload variable.
If the webhook requires a password or other sensitive string in its payload, set Secret to the secret that contains it. When you configure the automation that uses the webhook, you can access the secret as a payload variable by prefixing its name with $.
If the webhook’s access token is stored in a secret, you must also complete the next step to specify the secret as the access token.
To verify that the W&B can connect and authenticate to the endpoint:
Optionally, provide a payload to test. To refer to a secret the webhook has access to in the payload, prefix its name with $. This payload is only used for testing and is not saved. You configure an automation’s payload when you create the automation. See Troubleshoot your webhook to view where the secret and access token are specified in the POST request.
Click Test. W&B attempts to connect to the webhook’s endpoint using the credentials you configured. If you provided a payload, W&B sends it.
If the test does not succeed, verify the webhook’s configuration and try again. If necessary, refer to Troubleshoot your webhook.
After you configure a webhook, select Registry or Project, then follow these steps to create an automation that triggers the webhook.
A Registry admin can create automations in that registry. Registry automations are applied to all collections in the registry, including those added in the future.
Log in to W&B.
Click the name of a registry to view its details,
To create an automation scoped to the registry, click the Automations tab, then click Create automation. An automation that is scoped to a registry is automatically applied to all of its collections (including those created in the future).
To create an automation scoped only to a specific collection in the registry, click the collection’s action ... menu, then click Create automation. Alternatively, while viewing a collection, create an automation for it using the Create automation button in the Automations section of the collection’s details page.
Choose the event to watch for. Fill in any additional fields that appear, which depend upon the event. For example, if you select An artifact alias is added, you must specify the Alias regex. Click Next step.
Set Action type to Webhooks. then select the webhook to use.
If you configured an access token for the webhook, you can access the token in the ${ACCESS_TOKEN}payload variable. If you configured a secret for the webhook, you can access it in the payload by prefixing its name with $. Your webhook’s requirements are determined by the webhook’s service.
Click Next step.
Provide a name for the automation. Optionally, provide a description. Click Create automation.
A W&B admin can create automations in a project.
Log in to W&B and go to the project page.
In the sidebar, click Automations.
Click Create automation.
Choose the event to watch for, such as when an artifact alias is added or when a run metric meets a given threshold.
Fill in any additional fields that appear, which depend upon the event. For example, if you select An artifact alias is added, you must specify the Alias regex.
Optionally specify a collection filter. Otherwise, the automation is applied to all collections in the project, including those added in the future.
Set Action type to Webhooks. then select the webhook to use.
If your webhook requires a payload, construct it and paste it into the Payload field. If you configured an access token for the webhook, you can access the token in the ${ACCESS_TOKEN}payload variable. If you configured a secret for the webhook, you can access it in the payload by prefixing its name with $. Your webhook’s requirements are determined by the webhook’s service.
Click Next step.
Provide a name for the automation. Optionally, provide a description. Click Create automation.
View and manage automations
Manage a registry’s automations from the registry’s Automations tab.
Manage a collection’s automations from the Automations section of the collection’s details page.
From either of these pages, a Registry admin can manage existing automations:
To view an automation’s details, click its name.
To edit an automation, click its action ... menu, then click Edit automation.
To delete an automation, click its action ... menu, then click Delete automation. Confirmation is required.
A W&B admin can view and manage a project’s automations from the project’s Automations tab.
To view an automation’s details, click its name.
To edit an automation, click its action ... menu, then click Edit automation.
To delete an automation, click its action ... menu, then click Delete automation. Confirmation is required.
Payload reference
Use these sections to construct your webhoook’s payload. For details about testing your webhook and its payload, refer to Troubleshoot your webhook.
Payload variables
This section describes the variables you can use to construct your webhook’s payload.
Variable
Details
${project_name}
The name of the project that owns the mutation that triggered the action.
${entity_name}
The name of the entity or team that owns the mutation that triggered the action.
${event_type}
The type of event that triggered the action.
${event_author}
The user that triggered the action.
${artifact_collection_name}
The name of the artifact collection that the artifact version is linked to.
${artifact_metadata.<KEY>}
The value of an arbitrary top-level metadata key from the artifact version that triggered the action. Replace <KEY> with the name of a top-level metadata key. Only top-level metadata keys are available in the webhook’s payload.
${artifact_version}
The Wandb.Artifact representation of the artifact version that triggered the action.
${artifact_version_string}
The string representation of the artifact version that triggered the action.
${ACCESS_TOKEN}
The value of the access token configured in the webhook, if an access token is configured. The access token is automatically passed in the Authorization: Bearer HTTP header.
${SECRET_NAME}
If configured, the value of a secret configured in the webhook. Replace SECRET_NAME with the name of the secret.
Payload examples
This section includes examples of webhook payloads for some common use cases. The examples demonstrate how to use payload variables.
Verify that your access tokens have required set of permissions to trigger your GHA workflow. For more information, see these GitHub Docs.
Send a repository dispatch from W&B to trigger a GitHub action. For example, suppose you have a GitHub workflow file that accepts a repository dispatch as a trigger for the on key:
on:
repository_dispatch:
types: BUILD_AND_DEPLOY
The payload for the repository might look something like:
The event_type key in the webhook payload must match the types field in the GitHub workflow YAML file.
The contents and positioning of rendered template strings depends on the event or model version the automation is configured for. ${event_type} will render as either LINK_ARTIFACT or ADD_ARTIFACT_ALIAS. See below for an example mapping:
Use template strings to dynamically pass context from W&B to GitHub Actions and other tools. If those tools can call Python scripts, they can consume the registered model artifacts through the W&B API.
Review a W&B report, which illustrates how to use a Github Actions webhook automation for Model CI. Check out this GitHub repository to learn how to create model CI with a Modal Labs webhook.
This example payload shows how to notify your Teams channel using a webhook:
{
"@type": "MessageCard",
"@context": "http://schema.org/extensions",
"summary": "New Notification",
"sections": [
{
"activityTitle": "Notification from WANDB",
"text": "This is an example message sent via Teams webhook.",
"facts": [
{
"name": "Author",
"value": "${event_author}" },
{
"name": "Event Type",
"value": "${event_type}" }
],
"markdown": true }
]
}
You can use template strings to inject W&B data into your payload at the time of execution (as shown in the Teams example above).
This section is provided for historical purposes. If you currently use a webhook to integrate with Slack, W&B recommends that you update your configuration to use the [new Slack integration]({{ relref “#create-a-slack-automation”}}) instead.
Set up your Slack app and add an incoming webhook integration with the instructions highlighted in the Slack API documentation. Ensure that you have the secret specified under Bot User OAuth Token as your W&B webhook’s access token.
Interactively troubleshoot your webhook with the W&B App UI or programmatically with a Bash script. You can troubleshoot a webhook when you create a new webhook or edit an existing webhook.
A team admin can test a webhook interactively with the W&B App UI.
Navigate to your W&B Team Settings page.
Scroll to the Webhooks section.
Click on the horizontal three docs (meatball icon) next to the name of your webhook.
Select Test.
From the UI panel that appears, paste your POST request to the field that appears.
Click on Test webhook. Within the W&B App UI, W&B posts the response from your endpoint.