- 重要な情報
- はじめに
- 用語集
- エージェント
- インテグレーション
- OpenTelemetry
- 開発者
- API
- CoScreen
- アプリ内
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
ロールを作成した後、Datadog でロールを更新するか Datadog Permission API を使用して、このロールへアクセス許可を直接割り当てたり削除したりできます。利用可能なアクセス許可の一覧は次のとおりです。
一般許可は、各ロールのユーザーに対して基本的なアクセス権を許可するものです。高度な許可は、一般許可に加えて付与される特定目的の許可を指します。
Name | Description |
---|---|
admin | Deprecated. Privileged Access (also known as Admin permission) has been replaced by more specific permissions: Access Management, Org Management, Billing Read/Write, Usage Read/Write. |
standard | View and edit components in your Datadog organization that do not have explicitly defined permissions. This includes Cloud Cost Management, Reference Tables, metadata for metrics, and facets (except Logs). |
saved_views_write | Modify Saved Views across all Datadog products. |
注: ロールに standard
アクセス許可の両方がないことにより定義されるため、read-only
アクセス許可はありません。
デフォルトで、既存ユーザーは 3 つのすぐに使用できるロールのうち 1 つに紐付けられています。
すべてのユーザーは、すべてのデータタイプを読み取ることができます、管理者および標準ユーザーには、アセットでの書き込み権限があります。
注: ユーザーに新しいカスタムロールを追加する際、新しいロールのアクセス許可を適用するために、そのユーザーに関連付けられている既存の Datadog ロールを必ず削除してください。
一般的な権限に加え、特定のアセットやデータタイプに対してより詳細な権限を定義することができます。以下の表では、これらのオプションの詳細と、利用可能な各権限への影響をご覧ください。
Find below the list of permissions for the api and application keys assets:
Name | Description |
---|---|
user_app_keys | View and manage Application Keys owned by the user. |
org_app_keys_read | View Application Keys owned by all users in the organization. |
org_app_keys_write | Manage Application Keys owned by all users in the organization. |
api_keys_read | List and retrieve the key values of all API Keys in your organization. |
api_keys_write | Create, rename, and revoke API Keys for your organization. |
client_tokens_read | Read Client Tokens. Unlike API keys, client tokens may be exposed client-side in JavaScript code for web browsers and other clients to send data to Datadog. |
client_tokens_write | Create and edit Client Tokens. Unlike API keys, client tokens may be exposed client-side in JavaScript code for web browsers and other clients to send data to Datadog. |
Find below the list of permissions for the apm assets:
Name | Description |
---|---|
apm_read | Read and query APM and Trace Analytics. |
apm_retention_filter_read | Read trace retention filters. A user with this permission can view the retention filters page, list of filters, their statistics, and creation info. |
apm_retention_filter_write | Create, edit, and delete trace retention filters. A user with this permission can create new retention filters, and update or delete to existing retention filters. |
apm_service_ingest_read | Access service ingestion pages. A user with this permission can view the service ingestion page, list of root services, their statistics, and creation info. |
apm_service_ingest_write | Edit service ingestion pages' root services. A user with this permission can edit the root service ingestion and generate a code snippet to increase ingestion per service. |
apm_apdex_manage_write | Set Apdex T value on any service. A user with this permission can set the T value from the Apdex graph on the service page. |
apm_tag_management_write | Edit second primary tag selection. A user with this permission can modify the second primary tag dropdown in the APM settings page. |
apm_primary_operation_write | Edit the operation name value selection. A user with this permission can modify the operation name list in the APM settings page and the operation name controller on the service page. |
debugger_write | Edit Dynamic Instrumentation configuration. |
debugger_read | View Dynamic Instrumentation configuration. |
apm_generate_metrics | Create custom metrics from spans. |
apm_pipelines_write | Add and change APM pipeline configurations. |
apm_pipelines_read | View APM pipeline configurations. |
apm_service_catalog_write | Add, modify, and delete service catalog definitions when those definitions are maintained by Datadog. |
apm_service_catalog_read | View service catalog and service definitions. |
apm_remote_configuration_write | Edit APM Remote Configuration. |
apm_remote_configuration_read | View APM Remote Configuration. |
continuous_profiler_read | View data in Continuous Profiler. |
Find below the list of permissions for the access management assets:
Name | Description |
---|---|
user_access_invite | Invite other users to your organization. |
user_access_manage | Disable users, manage user roles, manage SAML-to-role mappings, and configure logs restriction queries. |
service_account_write | Create, disable, and use Service Accounts in your organization. |
org_management | Edit org configurations, including authentication and certain security preferences such as configuring SAML, renaming an org, configuring allowed login methods, creating child orgs, subscribing & unsubscribing from apps in the marketplace, and enabling & disabling Remote Configuration for the entire organization. |
Find below the list of permissions for the billing and usage assets:
Name | Description |
---|---|
billing_read | View your organization's subscription and payment method but not make edits. |
billing_edit | Manage your organization's subscription and payment method. |
usage_read | View your organization's usage and usage attribution. |
usage_edit | Manage your organization's usage attribution set-up. |
usage_notifications_read | Receive notifications and view currently configured notification settings. |
usage_notifications_write | Receive notifications and configure notification settings. |
Find below the list of permissions for the ci visibility assets:
Name | Description |
---|---|
ci_visibility_read | View CI Visibility. |
ci_visibility_write | Edit flaky tests and delete Test Services. |
ci_provider_settings_write | Edit CI Provider settings. Manage GitHub accounts and repositories for enabling CI Visibility and job logs collection. |
ci_visibility_settings_write | Configure CI Visibility settings. Set a repository default branch, enable GitHub comments, and delete test services. |
intelligent_test_runner_activation_write | Enable or disable Intelligent Test Runner. |
intelligent_test_runner_settings_write | Edit Intelligent Test Runner settings, such as modifying ITR excluded branch list. |
ci_ingestion_control_write | Edit CI Ingestion Control exclusion filters. |
Find below the list of permissions for the case and incident management assets:
Name | Description |
---|---|
incident_read | View incidents in Datadog. |
incident_write | Create, view, and manage incidents in Datadog. |
incident_settings_read | View Incident Settings. |
incident_settings_write | Configure Incident Settings. |
incidents_private_global_access | Access all private incidents in Datadog, even when not added as a responder. |
cases_read | View Cases. |
cases_write | Create and update cases. |
incident_notification_settings_read | View Incidents Notification settings. |
incident_notification_settings_write | Configure Incidents Notification settings. |
Find below the list of permissions for the cloud security platform assets:
Name | Description |
---|---|
security_monitoring_rules_read | Read Detection Rules. |
security_monitoring_rules_write | Create and edit Detection Rules. |
security_monitoring_signals_read | View Security Signals. |
security_monitoring_signals_write | Modify Security Signals. |
security_monitoring_filters_read | Read Security Filters. |
security_monitoring_filters_write | Create, edit, and delete Security Filters. |
appsec_event_rule_read | View Application Security Management Event Rules. |
appsec_event_rule_write | Edit Application Security Management Event Rules. |
security_monitoring_notification_profiles_read | Read Notification Rules. |
security_monitoring_notification_profiles_write | Create, edit, and delete Notification Rules. |
security_monitoring_cws_agent_rules_read | Read Cloud Workload Security Agent Rules. |
security_monitoring_cws_agent_rules_write | Create, edit, and delete Cloud Workload Security Agent Rules. |
appsec_protect_read | View blocked attackers. |
appsec_protect_write | Manage blocked attackers. |
appsec_activation_read | View whether Application Security Management has been enabled or disabled on services via 1-click enablement with Remote Configuration. |
appsec_activation_write | Enable or disable Application Security Management on services via 1-click enablement with Remote Configuration. |
security_monitoring_findings_read | View CSPM Findings. |
security_monitoring_findings_write | Mute CSPM Findings. |
Find below the list of permissions for the compliance assets:
Name | Description |
---|---|
audit_logs_read | View Audit Trail in your organization. |
audit_logs_write | Configure Audit Trail in your organization. |
data_scanner_read | View Data Scanner configurations. |
data_scanner_write | Edit Data Scanner configurations. |
Find below the list of permissions for the dashboards assets:
Name | Description |
---|---|
dashboards_read | View dashboards. |
dashboards_write | Create and change dashboards. |
dashboards_public_share | Generate public and authenticated links to share dashboards or embeddable graphs externally. |
generate_dashboard_reports | Schedule custom reports from a dashboard. These reports will display any viewable data regardless of any granular restrictions (restriction queries, scoped indexes) applied to the report's creator. |
Find below the list of permissions for the error tracking assets:
Name | Description |
---|---|
error_tracking_write | Edit Error Tracking settings. |
Find below the list of permissions for the events assets:
Name | Description |
---|---|
event_config_write | Manage general event configuration such as API Emails. |
Find below the list of permissions for the integrations assets:
Name | Description |
---|---|
integrations_api | Deprecated. Use the Integrations APIs to configure integrations. In order to configure integrations from the UI, a user must also have Standard Access. |
manage_integrations | Install, uninstall, and configure integrations. |
Find below the list of permissions for the log configuration assets and log data, along with the typical category of user you’d assign this permission to. See the recommendations on how to assign permissions to team members in the Logs RBAC guide.
Name | Description |
---|---|
logs_modify_indexes | Read and modify all indexes in your account. This includes the ability to grant the Logs Read Index Data and Logs Write Exclusion Filters permission to other roles, for some or all indexes. |
logs_write_exclusion_filters | Add and change exclusion filters for all or some log indexes. Can be granted in a limited capacity per index to specific roles via the Logs interface or API. If granted from the Roles interface or API, the permission has global scope. |
logs_write_pipelines | Add and change log pipeline configurations, including the ability to grant the Logs Write Processors permission to other roles, for some or all pipelines. |
logs_write_processors | Add and change some or all log processor configurations. Can be granted in a limited capacity per pipeline to specific roles via the Logs interface or API. If granted via the Roles interface or API the permission has global scope. |
logs_write_archives | Add and edit Log Archives. |
logs_generate_metrics | Create custom metrics from logs. |
logs_read_data | Read log data. In order to read log data, a user must have both this permission and Logs Read Index Data. This permission can be restricted with restriction queries. Restrictions are limited to the Log Management product. |
logs_read_archives | Read Log Archives location and use it for rehydration. |
logs_write_historical_view | Rehydrate logs from Archives. |
logs_write_facets | Create or edit Log Facets. |
logs_delete_data | Delete data from your Logs, including entire indexes. |
logs_write_forwarding_rules | Add and edit forwarding destinations and rules for logs. |
Log Management RBAC also includes two legacy permissions, superseded by finer-grained and more extensive logs_read_data
permission:
Name | Description |
---|---|
logs_live_tail | Access the live tail feature |
logs_read_index_data | Read a subset log data (index based) |
Find below the list of permissions for the metrics assets:
Name | Description |
---|---|
metric_tags_write | Edit and save tag configurations for custom metrics. |
Find below the list of permissions for the monitors assets:
Name | Description |
---|---|
monitors_read | View monitors. |
monitors_write | Edit, mute, and delete individual monitors. |
monitors_downtime | Set downtimes to suppress alerts from any monitor in an organization. The ability to write monitors is not required to set downtimes. |
monitor_config_policy_write | Create, update, and delete monitor configuration policies. |
Find below the list of permissions for the notebooks assets:
Name | Description |
---|---|
notebooks_read | View notebooks. |
notebooks_write | Create and change notebooks. |
Find below the list of permissions for the observability pipelines assets:
Name | Description |
---|---|
observability_pipelines_read | View pipeline configurations. |
observability_pipelines_write | Create, edit, and delete pipeline configurations. |
Find below the list of permissions for the real user monitoring assets:
Name | Description |
---|---|
rum_apps_write | Create, edit, and delete RUM applications. Creating a RUM application automatically generates a Client Token. In order to create Client Tokens directly, a user needs the Client Tokens Write permission. |
rum_apps_read | View RUM Applications data. |
rum_session_replay_read | View Session Replays. |
rum_generate_metrics | Create custom metrics from RUM events. |
Find below the list of permissions for the service level objectives assets:
Name | Description |
---|---|
slos_read | View SLOs and status corrections. |
slos_write | Create, edit, and delete SLOs. |
slos_corrections | Apply, edit, and delete SLO status corrections. A user with this permission can make status corrections, even if they do not have permission to edit those SLOs. |
Find below the list of permissions for the synthetic monitoring assets:
Name | Description |
---|---|
synthetics_private_location_read | View, search, and use Synthetics private locations. |
synthetics_private_location_write | Create and delete private locations in addition to having access to the associated installation guidelines. |
synthetics_global_variable_read | View, search, and use Synthetics global variables. |
synthetics_global_variable_write | Create, edit, and delete global variables for Synthetics. |
synthetics_read | List and view configured Synthetic tests and test results. |
synthetics_write | Create, edit, and delete Synthetic tests. |
synthetics_default_settings_read | View the default settings for Synthetic Monitoring. |
synthetics_default_settings_write | Edit the default settings for Synthetic Monitoring. |
Find below the list of permissions for the teams assets:
Name | Description |
---|---|
teams_manage | Manage Teams. Create, delete, rename, and edit metadata of all Teams. To control Team membership across all Teams, use the User Access Manage permission. |
Find below the list of permissions for the watchdog assets:
Name | Description |
---|---|
watchdog_insights_read | View Watchdog Insights. |
watchdog_alerts_write | Manage Watchdog Alerts. |
Find below the list of permissions for the workflows assets:
Name | Description |
---|---|
workflows_read | View workflows. |
workflows_write | Create, edit, and delete workflows. |
workflows_run | Run workflows. |
connections_read | List and view available connections. Connections contain secrets that cannot be revealed. |
connections_write | Create and delete connections. |
connections_resolve | Resolve connections. |
お役に立つドキュメント、リンクや記事: