- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
If you experience issues with Cloud Security Management (CSM) Threats, use the following troubleshooting guidelines. If you need further assistance, contact Datadog support.
Similar to the Agent flare, you can send necessary troubleshooting information to the Datadog support team with one flare command.
The flare asks for confirmation before upload, so you may review the content before the Security Agent sends it.
In the commands below, replace <CASE_ID>
with your Datadog support case ID if you have one, then enter the email address associated with it.
If you don’t have a case ID, just enter your email address used to login in Datadog to create a new support case.
Platform | Command |
---|---|
Docker | docker exec -it datadog-agent security-agent flare <CASE_ID> |
Kubernetes | kubectl exec -it <POD_NAME> -c security-agent -- security-agent flare <CASE_ID> |
Host | sudo /opt/datadog-agent/embedded/bin/security-agent flare <CASE_ID> |
In order to ensure that the communication between the security-agent
and the system-probe
is working as expected and that Cloud Security Management Threats (CSM Threats) is able to detect system events, you can manually trigger self tests by running the following command:
Platform | Command |
---|---|
Docker | docker exec -it datadog-agent security-agent runtime self-test |
Kubernetes | kubectl exec -it <POD_NAME> -c security-agent -- security-agent runtime self-test |
Host | sudo /opt/datadog-agent/embedded/bin/security-agent runtime self-test |
The self-test procedure creates some temporary files and rules to monitor them, and then triggers those rules to ensure that events are correctly propagated.
The following response appears when rules are propagated.
Runtime self test: OK
You can now see events coming from the runtime-security-agent
in the Log Explorer.
The network based detections of CSM Threats rely on the traffic control sub-system of the Linux kernel. This sub-system is known to introduce race conditions if multiple vendors try to insert, replace, or delete filters on the “clsact” ingress qdisc. Follow the checklist below to ensure that CSM Threats is properly configured:
runtime_security_config.network.classifier_priority
to a number strictly below the priority chosen by your vendor.For example, there is a known race with Cilium 1.9 and lower with the Datadog Agent (version 7.36 to 7.39.1, 7.39.2 excluded) that may happen when a new pod is started. The race can lead to loss of connectivity inside the pod, depending on how Cilium is configured.
Ultimately, if the Datadog Agent or your third party vendors cannot be configured to prevent the issue from happening, you should disable the network based detections of CSM Threats by following the steps below:
system-probe.yaml
configuration file on host based installations:runtime_security_config:
network:
enabled: false
datadog:
securityAgent:
runtime:
network:
enabled: false
DD_RUNTIME_SECURITY_CONFIG_NETWORK_ENABLED=false
추가 유용한 문서, 링크 및 기사: