- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
This article outlines upcoming changes to how notification rules are configured. These changes mostly impact Cloud Security Management (CSM), and more specifically cloud configuration and infrastructure configuration signals.
Note that for the time being, the changes will only affect how you get notified after manually upgrading a notification rule, or after the final deprecation date is reached (early 2025).
Until today, notifications for CSM Misconfigurations would only be sent out for detection rules that have signals enabled, as shown in the following diagram:
Previous workflow:
As part of the upcoming changes to notification rules, you are no longer required to enable signals in order to generate notifications. The new workflow is shown in the following diagram:
New workflow:
This change has the following impact on how notifications are generated for CSM Misconfigurations:
When you create a notification rule, you are now required to choose between two different source types: Vulnerability or Threat (Signal).
To migrate notifications that are configured for individual detection rules:
On the Misconfiguration Rules page, select a detection rule that has notifications enabled for it.
In the banner displayed in the Set severity and notifications section, click Update in 1-Click.
The Notification Rules editor page is displayed with the fields pre-populated with the information from the rule.
Modify the settings, if desired.
Click Save and Activate.
To migrate notification rules configured for cloud or infrastructure configuration signals, change the target from Cloud Configuration or Infrastructure Configuration to Vulnerability > Misconfiguration.
If you have any questions, contact Datadog support.
추가 유용한 문서, 링크 및 기사: