- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Orca Security - Alerts
Orca Security is a cloud security platform that identifies, prioritizes, and remediates security risks and compliance. It provides features like real-time visibility, vulnerability management, workload protection, cloud security posture management, and compliance management. This integration ingests the following log:
The Orca Security integration seamlessly ingests alert logs data using the built-in integration of Orca with Datadog. Before ingestion of the data, it normalizes and enriches the logs, ensures a consistent data format, and enhances information content for downstream processing and analysis. The integration provides insights into alert logs through the out-of-the-box dashboards.
Login to the Orca Security Platform.
Go to Settings > Connections > Integrations.
In the SIEM/SOAR section, select Datadog, and then click Connect.
The Datadog Configuration window opens.
Specify the following settings:
Click Save.
Click Configure on the Datadog Integration and enable the integration.
Go to Automations and click + Create Automation.
In the Automation Details section, provide Automation Name.
In the Trigger Query section, select all the values for alert state in the query. The query should look like this: When an alert Alert State is open,in_progress,snoozed,dismissed,closed
In the Define Results section, enable Apply to Existing Alerts if existing alerts in the Orca Security platform need to be forwarded to Datadog, or disable it to forward newly generated/updated alerts.
Note: Alerts that were updated more than 18 hours ago cannot be ingested into Datadog.
In the SIEM/SOAR section under the Define Results section, check Datadog and select Logs as the Datadog type.
Click Create.
The Orca integration collects and forwards Orca alert logs to Datadog.
The Orca integration does not include any metrics.
The Orca integration does not include any events.
For further assistance, contact Datadog Support.
Orca Security - Alerts