- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Supported OS
WatchGuard Firebox - Overview
WatchGuard Firebox - Firewall
WatchGuard Firebox - Networking Events
WatchGuard Firebox - Proxy Policy
WatchGuard Firebox - VPN
WatchGuard Firebox - Management Activity Monitor
WatchGuard Firebox is a network security platform offering comprehensive threat protection, including firewall, networking, and other security features, suitable for various network environments, from small offices to large enterprises.
This integration enriches and ingests the following events:
This integration seamlessly collects all the above listed logs, channeling them into Datadog for analysis. Leveraging the built-in logs pipeline, these logs are parsed and enriched, enabling effortless search and analysis. The integration provides insight into firewall, networking, management, VPN, and proxy policy events through the out-of-the-box dashboards. Additionally, it includes ready-to-use Cloud SIEM detection rules for enhanced monitoring and security.
To install the WatchGuard Firebox integration, run the following Agent installation command and the steps below. For more information, see the Integration Management documentation.
Note: This step is not necessary for Agent version >= 7.66.0.
Linux command:
sudo -u dd-agent -- datadog-agent integration install datadog-watchguard-firebox==1.0.0
Collecting logs is disabled by default in the Datadog Agent. Enable it in datadog.yaml
:
logs_enabled: true
Add this configuration block to your watchguard-firebox.d/conf.yaml
file to start collecting your WatchGuard Firebox logs. See the sample watchguard-firebox.d/conf.yaml for available configuration options.
logs:
- type: udp
port: <PORT>
service: watchguard-firebox
source: watchguard-firebox
Note:
Run the Agent’s status subcommand and look for watchguard-firebox
under the Checks section.
The WatchGuard Firebox integration collects firewall, networking, management, VPN, and proxy policy Events.
The WatchGuard Firebox integration does not include any metrics.
The WatchGuard Firebox integration does not include any events.
Permission denied while port binding:
If you see a Permission denied error while port binding in the Agent logs, see the following instructions:
Binding to a port number under 1024 requires elevated permissions. Grant access to the port using the setcap
command:
Grant access to the port using the setcap
command:
sudo setcap CAP_NET_BIND_SERVICE=+ep /opt/datadog-agent/bin/agent/agent
Verify the setup is correct by running the getcap
command:
sudo getcap /opt/datadog-agent/bin/agent/agent
With the expected output:
/opt/datadog-agent/bin/agent/agent = cap_net_bind_service+ep
Note: Re-run this setcap
command every time you upgrade the Agent.
Data is not being collected:
Make sure that traffic is bypassed from the configured port if the firewall is enabled.
Port already in use:
If you see the Port <PORT_NUMBER> Already in Use error, see the following instructions. The example below is for a PORT_NUMBER equal to 514:
On systems using Syslog, if the Agent listens for events on port 514, the following error can appear in the Agent logs: Can't start UDP forwarder on port 514: listen udp :514: bind: address already in use
.
This error occurs because by default, Syslog listens on port 514. To resolve this error, take one of the following steps:
For any further assistance, contact Datadog support.
WatchGuard Firebox - Overview
WatchGuard Firebox - Firewall
WatchGuard Firebox - Networking Events
WatchGuard Firebox - Proxy Policy
WatchGuard Firebox - VPN
WatchGuard Firebox - Management Activity Monitor