Skip to content

Commit 4121d51

Browse files
committed
Add AAP to the Envoy integration
1 parent 09df43f commit 4121d51

File tree

2 files changed

+47
-0
lines changed

2 files changed

+47
-0
lines changed

envoy/README.md

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,49 @@ This check collects distributed system observability metrics from [Envoy][1].
66

77
## Setup
88

9+
## Security
10+
11+
### Overview
12+
13+
[Datadog App & API Protection][30] extends visibility and inline threat mitigation to your Envoy proxy instance.
14+
15+
With this integration, you can detect and block attacks—such as API abuse, business logic exploitation, and code-layer threats—right at the edge of your cloud infrastructure.
16+
17+
Key Benefits:
18+
- **Inline threat detection and blocking** at the load balancer using Datadog Security Signals
19+
- **Real-time insights** into application-layer attacks with traces and logs in one unified view
20+
- **Edge enforcement** against OWASP API threats, credential stuffing, injection attacks, and more
21+
22+
### Installation
23+
24+
The installation process requires a different approach than enabling this integration.
25+
26+
#### Envoy
27+
28+
The installation instructions are available in the [Enabling App & API Protection for Envoy][31] documentation.
29+
30+
#### Istio
31+
32+
The installation instructions are available in the [Enabling App and API Protection for Istio][32] documentation.
33+
34+
### Validation
35+
36+
To validate App & API Protection threat detection, send known attack patterns to your load balancer. For example, you can trigger the Security Scanner Detected rule by running the following curl script:
37+
38+
```sh
39+
for ((i=1;i<=250;i++));
40+
do
41+
# Target existing service's routes
42+
curl https://your-load-balancer-url/existing-route -A dd-test-scanner-log;
43+
44+
# Target non existing service's routes
45+
curl https://your-load-balancer-url/non-existing-route -A dd-test-scanner-log;
46+
done
47+
```
48+
49+
A few minutes after enabling the service extension and sending known attack patterns, threat information will appear in the Application Signals Explorer.
50+
51+
952
### Installation
1053

1154
The Envoy check is included in the [Datadog Agent][2] package, so you don't need to install anything else on your server.
@@ -215,3 +258,6 @@ Need help? Contact [Datadog support][16].
215258
[16]: https://docs.datadoghq.com/help/
216259
[17]: https://docs.datadoghq.com/integrations/openmetrics/
217260
[18]: https://github.com/DataDog/integrations-core/blob/7.33.x/envoy/datadog_checks/envoy/data/conf.yaml.example
261+
[30]: https://docs.datadoghq.com/security/application_security/
262+
[31]: https://docs.datadoghq.com/security/application_security/setup/standalone/envoy/
263+
[32]: https://docs.datadoghq.com/security/application_security/setup/standalone/istio/

envoy/manifest.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@
1818
"Supported OS::Windows",
1919
"Supported OS::macOS",
2020
"Category::Network",
21+
"Category::Security",
2122
"Submitted Data Type::Metrics",
2223
"Submitted Data Type::Logs",
2324
"Offering::Integration"

0 commit comments

Comments
 (0)