Skip to content

Releases: cloudposse/terraform-aws-datadog-integration

v1.3.0

07 Nov 17:32
65bbd7a
Compare
Choose a tag to compare
Add mission action to iam policy all @mfuhrmeisterDM (#53)

what

add

  • ec2:GetTransitGatewayPrefixListReferences
  • ec2:SearchTransitGatewayRoutes actions to iam policy all.

why

We see error messages in datadog that this is not allowed for datadog-integration.

Sync github @max-lobur (#50)

Rebuild github dir from the template

v1.2.0

17 May 09:19
7115183
Compare
Choose a tag to compare
  • No changes

v1.1.0

08 Feb 22:59
7115183
Compare
Choose a tag to compare
Updates to iam policy for iam kms s3 and sns @arcaven (#48)

why

  • DatadogAWSIntegration is making calls it is not authorized to perform
  • error rate in CloudTrail has increased
  • full value of paid Datadog service cannot be realized for those using AWS Integration
  • Issue #47

what

  • adds undocumented permissions used by DatadogAWSIntegration

references

v1.0.0

02 Nov 16:56
bf84d52
Compare
Choose a tag to compare
Update IAM Policy with latest allow all @Benbentwo (#46)

what

  • Updates iam_policy_all.tf to use the latest datadog IAM Policy

why

  • Latest Update

references

require datadog provider >= 3.9 @bendrucker (#43)

What

  • Requires version 3.9.0 or greater of the Datadog provider

Why

  • #42 implicitly requires this by setting attributes that were only introduced in 3.9.0. This explicitly sets that requirement earlier on, causing configurations using older versions to fail at terraform init rather than encounter "unexpected attribute" errors at runtime.

References

  • #42 added the new attributes

v0.18.0

15 Aug 17:21
85444c0
Compare
Choose a tag to compare
Grant IAM permission required by S3 Integration @goruha (#44)

what

  • Added IAM permission
s3:GetAccountPublicAccessBlock

why

  • Required by datadog s3 integration
CleanShot 2022-08-15 at 16 24 05@2x
git.io->cloudposse.tools update @dylanbannon (#41)

what and why

Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.

References

  • DEV-143

v0.17.0

29 Jun 19:43
5d79e77
Compare
Choose a tag to compare
Add `*_collection_enabled` attributes @bendrucker (#42)

What

  • The Datadog AWS integration supports toggling metrics, resource, and CSPM (Cloud Security Posture Management) collection for each account. This enables setting those attributes.
  • When CSPM collection is enabled, this automatically attaches the required SecurityAudit policy to the role.

Why

  • Allows CSPM to be declaratively enabled for AWS accounts.
  • Allows metrics to be disabled for accounts.
  • Retains backward compatibility by preserving var.security_audit_policy_enabled. In a breaking release, this could be removed in favor of just var.cspm_resource_collection_enabled.

References

v0.16.1

25 Nov 17:40
373b971
Compare
Choose a tag to compare

🚀 Enhancements

Tags and providers @nitrocode (#40)

what

  • Add tags
  • Bump providers

why

  • Tag everything
  • Use up to date providers to take advantage of bug fixes

references

N/A

v0.16.0

16 Oct 21:20
5f5c4e1
Compare
Choose a tag to compare
Update Datadog policies. Allow attaching `SecurityAudit` policy to the Datadog IAM role @aknysh (#38)

what

  • Update Datadog policies
  • Allow attaching SecurityAudit policy to the Datadog IAM role

why

  • Datadog has updated the required permissions for the "All" and 'Core" IAM policy configurations - keep up to date
  • Attaching the SecurityAudit policy allows Datadog to collect information about how AWS resources are configured (used in Datadog Cloud Security Posture Management to read security configuration metadata)
  • Datadog Cloud Security Posture Management (CSPM) makes it easier to assess and visualize the current and historic security posture of cloud environments, automate audit evidence collection, and catch misconfigurations that leave your organization vulnerable to attacks
  • Cloud Security Posture Management (CSPM) can be accessed at https://app.datadoghq.com/security/compliance/home

notes

  • The process to enable Datadog Cloud Security Posture Management (CSPM) consists of two steps (one automated, the other manual):

    • Enable SecurityAudit policy and provision it with terraform
    • In Datadog UI, perform the following manual steps:
    Go to the Datadog AWS integration tile
    Click on the AWS account where you wish to enable resource collection
    Go to the Resource collection section for that account and check the box "Route resource data to the Cloud Security Posture Management product"
    At the bottom left of the tile, click Update Configuration
    

image

references

v0.15.0

08 Oct 01:05
b55f18b
Compare
Choose a tag to compare
Remove unused variables @bendrucker (#37)

What

Removes unused variables that make it easy for a user to fail to correctly pass API keys to https://github.com/cloudposse/terraform-aws-datadog-lambda-forwarder when switching from v0.13 of this module.

Why

References

  • This was missed in #31

v0.14.3

31 Aug 23:03
c70209d
Compare
Choose a tag to compare

🚀 Enhancements

Partition @nitrocode (#35)

what

  • Add partition instead of hard coding aws

why

  • Allows govcloud

references

N/A