- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`App and API Protection integrates with AWS Web Application Firewall (WAF) by:
Both can be set up independently, but it is recommended to first set up the conversion of logs to traces in order to inspect the AWS WAF actions.
First, enable the conversion of logs to traces on the Settings page.
Then, ensure the web ACLs table contains request metrics as well as logs and traces.
Security traces are reported in the AAP Traces Explorer with service name aws.waf
.
To block attackers, Datadog needs to manage a dedicated IPset. This IPset must be referenced by the web ACL with a rule in blocking mode.
Multiple web ACLs can be set up in the same or in different AWS accounts. A Connection must be created on every AWS account.
Ensure the AWS role attached to the Connection has the following permissions:
GetIPSet
UpdateIPSet
Edit your Terraform configuration with the following content:
resource "aws_wafv2_ip_set" "Datadog-blocked-ipv4s" {
name = "Datadog-blocked-ipv4s"
ip_address_version = "IPV4"
scope = "CLOUDFRONT"
addresses = []
lifecycle {
# The addresses are managed by the Datadog Application Security product.
ignore_changes = [addresses]
}
}
# Add a blocking rule to your existing web ACL resource
resource "aws_wafv2_web_acl" "EdgeWAF" {
name = "EdgeWAF"
description = "undefined"
scope = "CLOUDFRONT"
default_action {
allow {}
}
rule {
name = "BlockedIPs"
priority = 0
action {
block {}
}
statement {
ip_set_reference_statement {
arn = aws_wafv2_ip_set."Datadog-blocked-ipv4s".arn
}
}
visibility_config {
cloudwatch_metrics_enabled = true
metric_name = "Datadog-blocked-ipv4s"
sampled_requests_enabled = true
}
}
visibility_config {
cloudwatch_metrics_enabled = true
metric_name = "EdgeWAF"
sampled_requests_enabled = true
}
}
Run terraform apply
to create and update the WAF resources.
After setup is complete, click Block New Attackers on the App & API Protection denylist page. Select the web ACL and associated AWS connection to block IP addresses.