- 필수 기능
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- 디지털 경험
- 소프트웨어 제공
- 보안
- 로그 관리
- 관리
- 인프라스트럭처
- ci
- containers
- csm
- ndm
- otel_guides
- overview
- slos
- synthetics
- tests
- 워크플로
Supported OS
Dashboard image of alerts count
Dashboard image of events list with title
Dashboard image of emerging alerts count
Dashboard image of imminent alerts count
The Cybersixgill actionable alerts check monitors critical assets across the deep, dark, and surface web such as IP addresses, domains, vulnerabilities, and VIPs. Receive alerts with context including severity, threat type, description, post snippet, recommendations, and assessments. This integration provides an out-of-the-box dashboard to prioritize and respond to threats.
To install the Cybersixgill actionable alerts check on your host:
ddev release build cybersixgill_actionable_alerts
.datadog-agent integration install -t datadog-cybersixgill-actionable-alerts==1.0.1
min_collection_interval: 3600
Verify that Cybersixgill events are generated in the Datadog Events Explorer.
cybersixgill_actionable_alert.can_connect
Returns OK
If Client Id and Client Secret are present in an Instance. Returns CRITICAL
If Configuration Errors occur.
Statuses: ok, critical
cybersixgill.health
Returns CRITICAL
If the Agent is unable to connect to Cybersixgill API
Statuses: ok, critical
This integration sends API-type events to Datadog.
Need help? Contact Cybersixgill support.
Dashboard image of alerts count
Dashboard image of events list with title
Dashboard image of emerging alerts count
Dashboard image of imminent alerts count