- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Private actions allow your Datadog workflows and apps to interact with services hosted on your private network without exposing your services to the public internet. To use private actions, you must install a private action runner on a host in your network and pair the runner with a Datadog Connection. For more information on setting up a runner and pairing it with a connection, see Private Actions.
Some private actions, such as Jenkins and PostgreSQL, require credentials to function. To configure credentials for a private action, you must:
config/credentials/
)./etc/dd-action-runner/credentials/
directory./etc/dd-action-runner/credentials/jenkins_token.json
.HTTP supports three authentication methods:
Basic authentication requires a credential file with a username and a password:
/etc/dd-action-runner/credentials/http_basic.json
{
"auth_type": "Basic Auth",
"credentials": [
{
"username": "USERNAME",
"password": "PASSWORD"
}
]
}
Replace USERNAME
and PASSWORD
with your username and password.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/http_basic.json
.
Token authentication requires a credential file with an array of token names and values:
/etc/dd-action-runner/credentials/http_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "TOKEN1",
"tokenValue": "VALUE1"
},
{
"tokenName": "TOKEN2",
"tokenValue": "VALUE2"
}
]
}
Replace TOKEN1
, TOKEN2
, VALUE1
, and VALUE2
with your token names and values.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/http_token.json
.
This connection type is suitable for HTTP endpoints that do not require authentication.
To configure this connection, specify the endpoint URL:
The GitLab connection accepts the following credentials:
Credential | Required | Description |
---|---|---|
baseURL | Yes | The URL of your self-managed GitLab instance. For more information, see GitLab API documentation. |
gitlabApiToken | Yes | The API token to authenticate with your GitLab instance. Generate this token in your GitLab user settings. |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/gitlab_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "gitlabApiToken",
"tokenValue": "GITLAB_API_TOKEN"
},
{
"tokenName": "baseURL",
"tokenValue": "GITLAB_URL"
}
]
}
Replace GITLAB_API_TOKEN
and GITLAB_URL
with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/gitlab_token.json
.
The Jenkins connection accepts the following credentials:
Credential | Required | Description |
---|---|---|
domain | Yes | The domain of the Jenkins server that you want to connect to. |
username | Yes | The username of the Jenkins user that you want to use to authenticate with the Jenkins server. This user must have the necessary permissions to perform the actions you want your runner to perform. |
token | Yes | The API token of the Jenkins user that you want to use to authenticate with the Jenkins server. This user must have the necessary permissions to perform the actions you want to perform. You can generate an API token in the Jenkins user settings. |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/jenkins_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "username",
"tokenValue": "USERNAME"
},
{
"tokenName": "token",
"tokenValue": "API_TOKEN"
},
{
"tokenName": "domain",
"tokenValue": "DOMAIN"
}
]
}
Replace USERNAME
, API_TOKEN
, and DOMAIN
with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/jenkins_token.json
.
MongoDB supports two authentication methods:
The MongoDB SRV authentication requires the following credentials:
Credential | Required | Description |
---|---|---|
username | Yes | The MongoDB username for authentication. |
password | Yes | The MongoDB password for authentication. |
srvHost | Yes | The SRV host for MongoDB Atlas or replica set discovery. |
database | No | The name of the database to connect to. |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/mongodb_srv_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "username",
"tokenValue": "USERNAME"
},
{
"tokenName": "password",
"tokenValue": "PASSWORD"
},
{
"tokenName": "srvHost",
"tokenValue": "SRV_HOST"
},
{
"tokenName": "database",
"tokenValue": "DATABASE"
}
]
}
Replace USERNAME
, PASSWORD
, SRV_HOST
, and DATABASE
with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/mongodb_srv_token.json
.
The MongoDB Standard authentication accepts the following credentials:
Credential | Required | Description |
---|---|---|
username | Yes | The MongoDB username for authentication. |
password | Yes | The MongoDB password for authentication. |
host | Yes | The hostname of the MongoDB server. |
port | Yes | The port number of the MongoDB server. |
database | No | The name of the database to connect to. |
authSource | No | The database containing the user’s credentials. Specify if the user is created in a different database than admin . |
authMechanism | No | The authentication mechanism to use. Specify if a specific authentication mechanism is required. |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/mongodb_standard_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "username",
"tokenValue": "USERNAME"
},
{
"tokenName": "password",
"tokenValue": "PASSWORD"
},
{
"tokenName": "host",
"tokenValue": "HOST"
},
{
"tokenName": "port",
"tokenValue": "PORT"
},
{
"tokenName": "database",
"tokenValue": "DATABASE"
},
{
"tokenName": "authSource",
"tokenValue": "AUTH_SOURCE"
},
{
"tokenName": "authMechanism",
"tokenValue": "AUTH_MECHANISM"
}
]
}
Replace USERNAME
, PASSWORD
, HOST
, PORT
, DATABASE
, AUTH_SOURCE
, and AUTH_MECHANISM
with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/mongodb_standard_token.json
.
The PostgreSQL connection accepts the following credentials:
Credential | Required | Description |
---|---|---|
host | Yes | The name of the host to connect to. For more information, see the official PostGreSQL documentation. |
port | Yes | The port number to connect to at the server host, or socket filename extension for UNIX-domain connections. For more information, see the official PostGreSQL documentation. |
user | Yes | The PostgreSQL user name to connect as. For more information, see the official PostGreSQL documentation. |
password | Yes | The password to use if the server demands password authentication. For more information, see the official PostGreSQL documentation. |
database | Yes | The database name. For more information, see the official PostGreSQL documentation. |
sslmode | Yes | This option determines whether or with what priority a secure SSL TCP/IP connection is negotiated with the server. Available options are require and disable .For more information, see the official PostGreSQL documentation. |
applicationName | No | The name of the application connecting to the PostGreSQL server. For more information, see the official PostGreSQL documentation. |
searchPath | No | Set a schema search path. For more information, see the official PostGreSQL documentation. |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/postgresql_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "host",
"tokenValue": "HOST_NAME"
},
{
"tokenName": "port",
"tokenValue": "PORT"
},
{
"tokenName": "user",
"tokenValue": "USER"
},
{
"tokenName": "password",
"tokenValue": "PASSWORD"
},
{
"tokenName": "database",
"tokenValue": "DATABASE_NAME"
},
{
"tokenName": "sslmode",
"tokenValue": "require"
},
{
"tokenName": "applicationName",
"tokenValue": "APPLICATION_NAME"
},
{
"tokenName": "searchPath",
"tokenValue": "SEARCH_PATH"
}
]
}
Replace the example values with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/postgresql_token.json
.
The Temporal supports three authentication methods:
The Temporal mTLS authentication requires the following credentials:
Credential | Required | Description |
---|---|---|
serverAddress | Yes | The server address (hostname and optional port). If undefined, port defaults to 7233. |
serverNameOverride | Yes | The server name that overrides the target name (SNI) used for TLS host name checking. This can be useful when you have a reverse proxy in front of a temporal server and want to override the SNI to route traffic to the appropriate backend based on custom rules. |
serverRootCACertificate | Yes | The root CA certificate used by the server. If not set, and if the server’s certificate is issued by a trusted authority, verification will still succeed (for example, if using a cloud provider like AWS, Google Cloud, or Azure, which issue server certificates through trusted, recognized CAs). |
clientCertPairCrt | Yes | The client certificate for connecting with mTLS. |
clientCertPairKey | Yes | The client key for connecting with mTLS. |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/temporal_mTLS_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "serverAddress",
"tokenValue": "SERVER_ADDRESS"
},
{
"tokenName": "serverNameOverride",
"tokenValue": "SERVER_NAME_OVERRIDE"
},
{
"tokenName": "serverRootCACertificate",
"tokenValue": "SERVER_ROOT_CA_CERTIFICATE"
},
{
"tokenName": "clientCertPairCrt",
"tokenValue": "CLIENT_CERTIFICATE"
},
{
"tokenName": "clientCertPairKey",
"tokenValue": "CLIENT_KEY"
}
]
}
Replace SERVER_ADDRESS
, SERVER_NAME_OVERRIDE
, SERVER_ROOT_CA_CERTIFICATE
, CLIENT_CERTIFICATE
, and CLIENT_KEY
with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/temporal_mTLS_token.json
.
The Temporal TLS authentication requires the following credentials:
Credential | Required | Description |
---|---|---|
serverAddress | Yes | The server address (hostname and optional port). If undefined, port defaults to 7233. |
serverNameOverride | Yes | The server name that overrides the target name (SNI) used for TLS host name checking. This can be useful when you have a reverse proxy in front of a temporal server and want to override the SNI to route traffic to the appropriate backend based on custom rules. |
serverRootCACertificate | Yes | The root CA certificate used by the server. If not set, and if the server’s certificate is issued by a trusted authority, verification will still succeed (for example, if using a cloud provider like AWS, Google Cloud, or Azure, which issue server certificates through trusted, recognized CAs). |
Include all credentials in a single file:
/etc/dd-action-runner/credentials/temporal_TLS_token.json
{
"auth_type": "Token Auth",
"credentials": [
{
"tokenName": "serverAddress",
"tokenValue": "SERVER_ADDRESS"
},
{
"tokenName": "serverNameOverride",
"tokenValue": "SERVER_NAME_OVERRIDE"
},
{
"tokenName": "serverRootCACertificate",
"tokenValue": "SERVER_ROOT_CA_CERTIFICATE"
}
]
}
Replace SERVER_ADDRESS
, SERVER_NAME_OVERRIDE
, and SERVER_ROOT_CA_CERTIFICATE
with your credentials.
In the runner’s connection, specify the location of the credential file on the private action runner’s container. In this example, the credential file is stored at /etc/dd-action-runner/credentials/temporal_TLS_token.json
.
This connection type uses unencrypted communication and is not recommended for production environments. It should only be used in development environments or for testing connections. For production use, consider using either the TLS or mTLS authentication types.
The connection type requires the following credentials:
Credential | Required | Description |
---|---|---|
address | Yes | The server hostname and optional port. Port defaults to 7233 if address contains only host. |
For this connection type, you do not need to create a credential file since the address is not a secret and is stored directly in Datadog. To configure, provide the server address: