8000 Rebase changes ASM => AAP · DataDog/documentation@b1ca9e1 · GitHub
[go: up one dir, main page]

Skip to content

Commit b1ca9e1

Browse files
committed
Rebase changes ASM => AAP
1 parent b5d0532 commit b1ca9e1

File tree

1 file changed

+26
-26
lines changed

1 file changed

+26
-26
lines changed

content/en/security/application_security/threats/setup/threat_detection/gcp-service-extensions.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ Before you begin, ensure you have:
4040

4141
## Enabling threat detection
4242

43-
To set up the ASM Service Extension in your GCP environment, use the Google Cloud Console or Terraform scripts and complete the following steps.
43+
To set up the AAP Service Extension in your GCP environment, use the Google Cloud Console or Terraform scripts and complete the following steps.
4444

45-
**Note:** Google Cloud provides guides for creating [a callout backend service][4] and [configuring a Service Extension as a traffic extension][5]. The following steps use the same general setup but include custom configurations specific to Datadog’s Application Security Management integration.
45+
**Note:** Google Cloud provides guides for creating [a callout backend service][4] and [configuring a Service Extension as a traffic extension][5]. The following steps use the same general setup but include custom configurations specific to Datadog's App and API Protection integration.
4646

4747
{{< tabs >}}
4848
{{% tab "Google Cloud Console" %}}
4949

50-
1. Create a VM Compute instance using the [Datadog ASM Service Extensions Docker image][1].
50+
1. Create a VM Compute instance using the [Datadog AAP Service Extensions Docker image][1].
5151

5252
See [Configuration](#configuration) for available environment variables when setting up your VM instance.
5353

@@ -79,7 +79,7 @@ To set up the ASM Service Extension in your GCP environment, use the Google Clou
7979
1. To send all traffic to the extension, insert `true` in the **Match condition**.
8080
2. For **Programability type**, select `Callouts`.
8181
3. Select the backend service you created in the previous step.
82-
4. Select all **Events** from the list where you want ASM to run detection (Request Headers and Response Headers are **required**).
82+
4. Select all **Events** from the list where you want AAP to run detection (Request Headers and Response Headers are **required**).
8383

8484
</br>
8585
{{% appsec-getstarted-2-plusrisk %}}
@@ -91,7 +91,7 @@ To set up the ASM Service Extension in your GCP environment, use the Google Clou
9191

9292
{{% tab "Terraform" %}}
9393

94-
You can use Terraform to automate the deployment of the ASM GCP Service Extension. This simplifies the process of setting up the service extension to work with your existing load balancer.
94+
You can use Terraform to automate the deployment of the AAP GCP Service Extension. This simplifies the process of setting up the service extension to work with your existing load balancer.
9595

9696
### Prerequisites for Terraform deployment
9797

@@ -112,16 +112,16 @@ The Terraform deployment will create the following components:
112112

113113
### Deployment Steps
114114

115-
The ASM Service Extension deployment requires several components that work together. We'll create a Terraform module that encapsulates all these components, making the deployment process repeatable and easier to maintain.
115+
The AAP Service Extension deployment requires several components that work together. We'll create a Terraform module that encapsulates all these components, making the deployment process repeatable and easier to maintain.
116116

117117
1. Create a new directory and the necessary Terraform files:
118118

119119
```bash
120-
mkdir gcp-asm-service-extension && cd gcp-asm-service-extension
120+
mkdir gcp-aap-service-extension && cd gcp-aap-service-extension
121121
touch main.tf variables.tf
122122
```
123123

124-
2. Add the following code to your `main.tf` file. This file defines all the infrastructure components needed for the ASM Service Extension, including network rules, VM instances, and load balancer configuration:
124+
2. Add the following code to your `main.tf` file. This file defines all the infrastructure components needed for the AAP Service Extension, including network rules, VM instances, and load balancer configuration:
125125

126126
```hcl
127127
# main.tf
@@ -131,7 +131,7 @@ The ASM Service Extension deployment requires several components that work toget
131131
#----------------------------------------------------------
132132
133133
# Firewall rule to allow the Service Extension to communicate with the Datadog Agent
134-
resource "google_compute_firewall" "asm_se_firewall" {
134+
resource "google_compute_firewall" "aap_se_firewall" {
135135
name = "${var.project_prefix}-dd-agent-firewall"
136136
network = "default"
137137
@@ -203,8 +203,8 @@ The ASM Service Extension deployment requires several components that work toget
203203
# Service Extension Callout Container Configuration
204204
#----------------------------------------------------------
205205
206-
# Datadog ASM GCP Service Extension container configuration
207-
module "gce-container-asm-service-extension" {
206+
# Datadog AAP GCP Service Extension container configuration
207+
module "gce-container-aap-service-extension" {
208208
source = "terraform-google-modules/container-vm/google"
209209
210210
container = {
@@ -228,7 +228,7 @@ The ASM Service Extension deployment requires several components that work toget
228228
auto_delete = true
229229
230230
initialize_params {
231-
image = module.gce-container-asm-service-extension.source_image
231+
image = module.gce-container-aap-service-extension.source_image
232232
}
233233
234234
}
@@ -239,7 +239,7 @@ The ASM Service Extension deployment requires several components that work toget
239239
}
240240
241241
metadata = {
242-
gce-container-declaration = module.gce-container-asm-service-extension.metadata_value
242+
gce-container-declaration = module.gce-container-aap-service-extension.metadata_value
243243
google-logging-enabled = "true"
244244
}
245245
@@ -248,18 +248,18 @@ The ASM Service Extension deployment requires several components that work toget
248248
}
249249
250250
# http-server: Allow access on the http server for health checks
251-
# https-server: Allow access on the 443 port for the ASM Service Extension
251+
# https-server: Allow access on the 443 port for the AAP Service Extension
252252
tags = ["http-server", "https-server", "lb-health-check"]
253253
}
254254
255255
#----------------------------------------------------------
256256
# Load Balancer Integration
257257
#----------------------------------------------------------
258258
259-
# Unmanaged Instance Group including the ASM Service Extension instance
260-
resource "google_compute_instance_group" "asm_se_instance_group" {
259+
# Unmanaged Instance Group including the AAP Service Extension instance
260+
resource "google_compute_instance_group" "aap_se_instance_group" {
261261
name = "${var.project_prefix}-instance-group"
262-
description = "Unmanaged instance group for the ASM Service Extension"
262+
description = "Unmanaged instance group for the AAP Service Extension"
263263
zone = var.zone
264264
265265
named_port {
@@ -278,7 +278,7 @@ The ASM Service Extension deployment requires several components that work toget
278278
}
279279
280280
# Health Check for the Backend Service
281-
resource "google_compute_health_check" "asm_se_health_check" {
281+
resource "google_compute_health_check" "aap_se_health_check" {
282282
name = "${var.project_prefix}-health-check"
283283
check_interval_sec = 5
284284
timeout_sec = 5
@@ -297,11 +297,11 @@ The ASM Service Extension deployment requires several components that work toget
297297
port_name = "grpc"
298298
protocol = "HTTP2"
299299
timeout_sec = 10
300-
health_checks = [google_compute_health_check.asm_se_health_check.self_link]
300+
health_checks = [google_compute_health_check.aap_se_health_check.self_link]
301301
load_balancing_scheme = "EXTERNAL_MANAGED"
302302
303303
backend {
304-
group = google_compute_instance_group.asm_se_instance_group.self_link
304+
group = google_compute_instance_group.aap_se_instance_group.self_link
305305
}
306306
}
307307
@@ -312,7 +312,7 @@ The ASM Service Extension deployment requires several components that work toget
312312
# GCP Service Extension configuration for traffic interception
313313
resource "google_network_services_lb_traffic_extension" "default" {
314314
name = "${var.project_prefix}-service-extension"
315-
description = "Datadog ASM Service Extension"
315+
description = "Datadog AAP Service Extension"
316316
location = "global"
317317
318318
load_balancing_scheme = "EXTERNAL_MANAGED"
@@ -332,7 +332,7 @@ The ASM Service Extension deployment requires several components that work toget
332332
timeout = "0.5s"
333333
fail_open = false # If the extension fails, the request is dropped
334334
335-
# Supported events for the ASM Service Extension
335+
# Supported events for the AAP Service Extension
336336
supported_events = ["REQUEST_HEADERS", "REQUEST_BODY", "RESPONSE_HEADERS", "RESPONSE_BODY"]
337337
}
338338
}
@@ -416,10 +416,10 @@ variable "load_balancer_forwarding_rule" {
416416
# main.tf
417417
418418
module "service_extension" {
419-
source = "./gcp-asm-service-extension"
419+
source = "./gcp-aap-service-extension"
420420
zone = "us-central1-a"
421421
region = "us-central1"
422-
project_prefix = "datadog-asm"
422+
project_prefix = "datadog-aap"
423423
application_vpc_subnetwork = "your-subnet-name"
424424
datadog_agent_api_key = "your-datadog-api-key"
425425
load_balancer_forwarding_rule = "projects/your-project/regions/us-central1/forwardingRules/your-lb-rule" # or with a self link on your resource
@@ -448,7 +448,7 @@ The service extension automatically inspects all traffic passing through your lo
448448

449449
## Configuration
450450

451-
The Datadog ASM Service Extension Docker image supports the following configuration settings:
451+
The Datadog AAP Service Extension Docker image supports the following configuration settings:
452452

453453
| Environment variable | Default value | Description |
454454
|----------------------------------------|-----------------|-------------------------------------------------------------------|
@@ -467,7 +467,7 @@ Configure the container to send traces to your Datadog Agent using the following
467467
<strong>Note:</strong> The GCP Service Extensions integration is built on top of the Datadog Go Tracer. It follows the same release process as the tracer, and its Docker images are tagged with the corresponding tracer version.
468468
</div>
469469

470-
The GCP Service Extensions integration uses the [Datadog Go Tracer][6] and inherits all environment variables from the tracer. You can find more configuration options in [Configuring the Go Tracing Library][7] and [ASM Library Configuration][8].
470+
The GCP Service Extensions integration uses the [Datadog Go Tracer][6] and inherits all environment variables from the tracer. You can find more configuration options in [Configuring the Go Tracing Library][7] and [AAP Library Configuration][8].
471471

472472
## Limitations
473473

0 commit comments

Comments
 (0)
0