Setup App and API Protection for Java in Kubernetes
For faster setup with automatic instrumentation, consider using Single Step APM Instrumentation, which automatically installs the Datadog SDK with no additional configuration required. See Single Step APM Instrumentation for setup instructions.
Once SSI is set up, you can enable App and API Protection by going to your APM service in the Datadog app → Service Configuration section → Enable Application Security Monitoring.
Overview
Datadog Application Security Management (ASM) provides App and API Protection (AAP) capabilities including:
- Application Security Monitoring: Real-time threat detection and protection against attacks like SQL injection, XSS, and more
- Software Composition Analysis (SCA): Identification of vulnerable dependencies in your codebase
- Interactive Application Security Testing (IAST): Runtime vulnerability detection during testing
ASM works by leveraging the Datadog Java tracing library to monitor HTTP requests, analyze patterns, and detect security threats in real-time. The library integrates seamlessly with your existing application without requiring code changes.
For detailed compatibility information, including supported Java versions, frameworks, and deployment environments, see Single Step Instrumentation Compatibility.
This guide explains how to set up App and API Protection (AAP) for Java applications running in Kubernetes. The setup involves:
- Installing the Datadog Agent
- Configuring your Java application deployment
- Enabling AAP monitoring
Prerequisites
- Kubernetes cluster
- Java application containerized with Docker
- kubectl configured to access your cluster
- Helm (recommended for Agent installation)
Setup
1. Install the Datadog Agent
Install the Datadog Agent using Helm:
helm repo add datadog https://helm.datadoghq.com
helm repo update
helm install datadog -f values.yaml datadog/datadog
Create a values.yaml
file with the following configuration:
datadog:
apiKey: <YOUR_API_KEY>
appKey: <YOUR_APP_KEY>
site: <YOUR_DD_SITE>
apm:
portEnabled: true
logs:
enabled: true
containerCollectAll: true
processAgent:
enabled: true
securityAgent:
compliance:
enabled: true
runtime:
enabled: true
Library setup
To enable AAP capabilities, you need the Datadog Java tracing library (version 0.94.0 or higher) installed in your application environment.
Download the library
Download the latest version of the Datadog Java library:
ADD 'https://dtdg.co/latest-java-tracer' /dd-java-agent.jar
Verify compatibility
To check that your service’s language and framework versions are supported for AAP capabilities, see Single Step Instrumentation Compatibility.
Service configuration
Run your application with AAP enabled
Start your Java application with the Datadog agent and AAP enabled:
apiVersion: apps/v1
kind: Deployment
metadata:
name: your-java-app
spec:
template:
spec:
containers:
- name: your-java-app
image: your-java-app-image
env:
- name: DD_APPSEC_ENABLED
value: "true"
- name: DD_SERVICE
value: "<MY_SERVICE>"
- name: DD_ENV
value: "<MY_ENV>"
command: ["java"]
args: ["-javaagent:/dd-java-agent.jar", "-jar", "/app.jar"]
If you want to use Application Security Management without APM tracing functionality, you can deploy with [Standalone App and API Protection][2]. This configuration reduces the amount of APM data sent to Datadog to the minimum required by App and API Protection products.
To enable standalone mode:
- Set
DD_APM_TRACING_ENABLED=false
environment variable - Keep
DD_APPSEC_ENABLED=true
environment variable - This configuration will minimize APM data while maintaining full security monitoring capabilities
Important considerations:
- File system requirements: Read-only file systems are not currently supported. The application must have access to a writable
/tmp
directory. - Service identification: Always specify
DD_SERVICE
(or -Ddd.service
) and DD_ENV
(or -Ddd.env
) for proper service identification in Datadog.
Add the Java agent to your container
Add the following to your Dockerfile:
# Download the Datadog Java agent
ADD 'https://dtdg.co/latest-java-tracer' /dd-java-agent.jar
# Set environment variables
ENV DD_APPSEC_ENABLED=true
ENV DD_SERVICE=<YOUR_SERVICE_NAME>
ENV DD_ENV=<YOUR_ENVIRONMENT>
Update your Kubernetes deployment
Modify your deployment YAML to include the Java agent:
apiVersion: apps/v1
kind: Deployment
metadata:
name: your-java-app
spec:
template:
spec:
containers:
- name: your-java-app
image: your-java-app-image
env:
- name: DD_APPSEC_ENABLED
value: "true"
- name: DD_SERVICE
value: "<YOUR_SERVICE_NAME>"
- name: DD_ENV
value: "<YOUR_ENVIRONMENT>"
command: ["java"]
args: ["-javaagent:/dd-java-agent.jar", "-jar", "/app.jar"]
3. Deploy your application
Apply your updated deployment:
kubectl apply -f your-deployment.yaml
Verify setup
To verify that AAP is working correctly:
- Send some traffic to your application
- Check the Application Signals Explorer in Datadog
- Look for security signals and vulnerabilities
Troubleshooting
If you encounter issues while setting up App and API Protection for your Java application, see the Java App and API Protection troubleshooting guide.
Further Reading
Additional helpful documentation, links, and articles: