- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Supported OS
Keycloak - Overview
Keycloak - User Events
Keycloak - Admin Events
Keycloak is an open-source identity and access management tool. It helps add authentication to applications and secure services with minimum effort. Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.
This integration parses the following types of logs:
Visualize detailed insights into these logs through the out-of-the-box dashboards. Additionally, out-of-the-box detection rules are available to help you monitor and respond to potential security threats effectively.
To install the Keycloak integration, run the following Agent installation command and the steps below. For more information, see the Integration Management documentation.
Note: This step is not necessary for Agent version >= 7.63.0.
Linux command
sudo -u dd-agent -- datadog-agent integration install datadog-keycloak==1.0.0
Collecting logs is disabled by default in the Datadog Agent. Enable it in thedatadog.yaml
:
logs_enabled: true
Add this configuration block to your keycloak.d/conf.yaml
file to start collecting your logs.
See the sample keycloak.d/conf.yaml for available configuration options. The appropriate protocol (either TCP or UDP) should be chosen based on the Keycloak syslog forwarding configuration. By default, Keycloak uses TCP.
tcp
.udp
. logs:
- type: <tcp/udp>
port: <PORT>
source: keycloak
service: keycloak
Note:
PORT
: Port should be similar to the port provided in Configure syslog message forwarding from keycloak section./opt/keycloak
, depending on the configuration). --log="syslog"
--log-level=org.keycloak.events:debug
--log-syslog-endpoint=<IP Address>:<Port>
--log-syslog-output=json
Optional: To use UDP instead of TCP for syslog forwarding, include the following option in the Keycloak start command:
--log-syslog-protocol=udp
bin/kc.[sh|bat] start --log="syslog" --log-syslog-endpoint=<IP Address>:<Port> --log-level=org.keycloak.events:debug --log-syslog-output=json
IP ADDRESS
: IP address where your Datadog Agent is running.
PORT
: Port number to send syslog messages.
Reference: Keycloak Syslog Configuration
Run the Agent’s status subcommand and look for keycloak
under the Checks section.
Format | Event Types |
---|---|
JSON | user-event, admin-event |
The Keycloak integration does not include any metrics.
The Keycloak integration does not include any events.
The Keycloak integration does not include any service checks.
Permission denied while port binding:
If you see a Permission denied error while port binding in the Agent logs:
Binding to a port number under 1024 requires elevated permissions. Grant access to the port using the setcap
command:
sudo setcap CAP_NET_BIND_SERVICE=+ep /opt/datadog-agent/bin/agent/agent
Verify the setup is correct by running the getcap
command:
sudo getcap /opt/datadog-agent/bin/agent/agent
With the expected output:
/opt/datadog-agent/bin/agent/agent = cap_net_bind_service+ep
Note: Re-run this setcap
command every time you upgrade the Agent.
Data is not being collected:
Ensure traffic is bypassed from the configured port if the firewall is enabled.
Port already in use:
If you see the Port <PORT_NUMBER> Already in Use error, see the following instructions. The following example is for port 514:
Can't start UDP forwarder on port 514: listen udp :514: bind: address already in use
. This error occurs because by default, Syslog listens on port 514. To resolve this error, take one of the following steps:For further assistance, contact Datadog support.
Keycloak - Overview
Keycloak - User Events
Keycloak - Admin Events