How to Securely Connect Datadog App Builder to On-Premise Systems

How to Securely Connect Datadog App Builder to On-Premise Systems

Datadog’s App Builder stands as a remarkable tool, extending the capabilities of the Datadog platform well beyond traditional observability measures. With it, users can develop custom applications tailored specifically to their needs, ranging from monitoring solutions to remediation tools and resource management utilities. However, organizations with on-premises workloads often face significant challenges in creating a secure and reliable connection between Datadog’s SaaS environment and their internal infrastructure. This article explores the intricacies of overcoming these obstacles, harnessing the power of Datadog’s Private Action Runner to facilitate seamless and secure interactions with private resources.

1. Overview of Datadog’s App Builder

Datadog’s App Builder opens up unparalleled possibilities by empowering users to create custom applications that cater specifically to their organizational needs. Beyond its core observability functions, App Builder can be utilized to develop advanced monitoring solutions, implement remediation tools, and manage various resources efficiently. The flexibility offered by App Builder allows users to tailor their applications precisely to their operational requirements, thereby unlocking a new realm of potential across different tasks and workflows.

Organizations can leverage App Builder to address specific scenarios such as monitoring complex infrastructure setups, automating remediation processes for faster issue resolution, and optimizing resource allocation for better performance management. These use cases underscore the transformative potential of App Builder, making it a game-changer for businesses seeking to elevate their operational capabilities. However, creating a seamless and secure connection between Datadog’s SaaS environment and on-premises systems presents a unique challenge, necessitating innovative solutions for optimal functionality.

2. Challenges for Organizations with On-Premises Workloads

Establishing a reliable and secure connection between Datadog’s SaaS environment and an organization’s internal infrastructure can be especially daunting. Typically, the need to interact with private resources poses significant obstacles, primarily due to the stringent security requirements that such interactions entail. Sensitive data from on-premises workloads must remain protected, and maintaining this level of security demands robust solutions designed to bridge the gap effectively.

Furthermore, traditional cloud APIs may not always meet the specific needs of organizations that depend on complex, localized setups. As a result, enterprises must find ways to enable secure access to internal systems while managing the intricate nuances of security protocols. Addressing these challenges is critical for organizations that seek to harness the full potential of Datadog’s App Builder without compromising the integrity of their private infrastructure.

3. Introduction of Datadog’s Private Action Runner

Datadog’s Private Action Runner plays a crucial role in bridging this gap, enabling secure interaction between App Builder and on-premises resources that would otherwise be inaccessible from the public network. Acting much like Datadog Synthetics’ private locations, but with enhanced features, the Private Action Runner ensures seamless integration by serving as a proxy within a private network.

In the App Builder mode, the runner functions by securely relaying requests initiated from the user’s browser, ensuring that sensitive data remains protected throughout the interaction. This outbound communication strategy is pivotal, as it allows the runner to validate the connection with Datadog for authentication and enrollment purposes, without exposing vulnerable data to external threats. Emphasizing security and data protection, the Private Action Runner addresses the pressing need for secure internal infrastructure interaction in a cloud-connected space.

4. Security and Data Protection

Ensuring secure data communication is paramount when connecting Datadog’s App Builder to on-premises systems. The Private Action Runner excels in this regard by only allowing outbound communication to authenticate and enroll with Datadog, effectively safeguarding sensitive data within the user’s environment. This security measure prevents any unauthorized access or exposure, ensuring that information remains protected during transit.

Given the high value placed on the security of internal data, the importance of managing outbound communication cannot be overstated. By restricting interactions to outbound messages, the Private Action Runner mitigates risks associated with data transmission, thereby offering robust protection measures that align with industry best practices. This security-centric approach is essential for organizations looking to integrate their on-premises systems with Datadog in a secure and reliable manner.

5. Optimizing Private Action Runner in App Builder Mode

To maximize the efficiency and benefits of the Private Action Runner in App Builder mode, specific steps must be undertaken, including assigning a DNS hostname and managing SSL termination. Assigning the DNS hostname is critical as it facilitates the identification and routing of requests to the appropriate resources within the private network.

Moreover, managing SSL termination is equally vital, ensuring that encrypted communication channels are maintained to protect data integrity. By setting up these configurations correctly, users can leverage the full potential of the Private Action Runner, ensuring seamless and secure interactions between Datadog’s SaaS environment and their internal systems. Implementing these optimizations enhances overall performance, providing a streamlined and secure integration process for organizations.

6. Deployment Recommendations

The Private Action Runner supports both Docker and Kubernetes environments, allowing users to choose the deployment strategy that best fits their operational needs. However, due to Kubernetes’ inherent scalability and manageability, it is generally preferred for deployment. Kubernetes enables dynamic resource allocation and efficient management of infrastructure components, making it highly suited to handle complex deployments.

Deploying the Private Action Runner on EKS (Elastic Kubernetes Service) further simplifies the integration process, centralizing resource interactions within Kubernetes and eliminating the need for separate scripts or Terraform configurations. This approach enhances manageability, scalability, and overall operational efficiency, ensuring a seamless and reliable deployment experience.

7. Navigate to Private Action Runner Page

Setting up the Private Action Runner begins with navigating to the dedicated page within Datadog. Users can easily locate this page by following Datadog’s user interface and navigating to the section specifically designated for Private Action Runner setup. Once there, users can initiate the setup process by selecting options and configurations tailored to their specific requirements.

The initial setup involves providing a descriptive name for the runner, selecting the operating model (whether for App Builder, workflow automation, or both), and inputting the DNS hostname. These details are crucial as they define the runner’s identity and specify the actions it is authorized to perform. Following these steps meticulously ensures that the Private Action Runner is accurately configured, ready to interact securely with on-premises systems.

8. Provide Details for Your Runner

After navigating to the setup page, users must input specific details to complete the configuration of the Private Action Runner. This includes naming the runner, selecting the appropriate operating model, inputting the DNS hostname, and specifying the actions permissible by the runner. Clear and descriptive naming helps in identifying and managing the runner effectively, while selecting the correct operating model ensures optimal functionality aligned with organizational needs.

Inputting the DNS hostname is essential for routing interactions within the private network, and specifying permitted actions ensures that the runner performs tasks securely and within defined boundaries. These steps are foundational to a secure and seamless integration, enabling the Private Action Runner to function efficiently within the Datadog App Builder ecosystem.

9. Generate and Configure Runner Credentials

With the initial setup complete, the next step involves generating and configuring the credentials required for the runner’s operations. Datadog provides a Docker command that facilitates the creation of the URN and private key necessary for the runner’s configuration. These credentials, alongside any required access information for internal infrastructure, are then added to the private-action-runner values YAML file.

Properly configuring these credentials is crucial for ensuring secure access and interaction with on-premises systems. By following the guidelines provided and accurately inputting the necessary details, users can establish a secure connection, allowing the Private Action Runner to operate effectively within their network environment.

10. Centralized Resource Management via Kubernetes on EKS

For streamlined management and deployment, centralizing resources within Kubernetes on EKS is an effective strategy. Utilizing Ingress resources allows for deploying an EKS-managed application load balancer (ALB) through the AWS Load Balancer Controller, which, when combined with ExternalDNS for automated DNS record management, forms a powerful deployment framework. This approach simplifies the integration process, enhancing manageability and scalability while maintaining robust security measures.

Centralized resource management within Kubernetes eliminates the need for separate scripts or manual interventions, offering a cohesive and streamlined deployment experience. By leveraging the capabilities of Kubernetes and EKS, organizations can ensure efficient interaction and optimal performance of the Private Action Runner within their network environment.

11. Sample Configuration for Ingress Resource

Creating a sample configuration for the Ingress resource is a critical step in handling SSL termination and Route53 record creation. This configuration specifies key attributes and operational parameters necessary for the efficient functioning of the Private Action Runner. For instance, users must replace placeholder values with actual details pertaining to their setup, ensuring that the runner integrates seamlessly within their network environment.

A typical configuration includes specifying certifications, health check protocols, and DNS hostnames, among other details. By meticulously configuring these elements, users can ensure that the Private Action Runner communicates securely with Datadog’s environment, safeguarding data transactions and maintaining operational integrity.

12. Orchestrate Deployment with Helmfile

Deploying the Private Action Runner, along with other necessary resources such as AWS Load Balancer Controller and ExternalDNS, requires orchestration via Helmfile. Before executing the Helm release, users must ensure that service accounts and identity and access management (IAM) policies are correctly configured as per the setup instructions provided by these resources. These configurations are pivotal for secure and efficient deployment.

Using Helmfile simplifies the orchestration process, bringing together all necessary components under a unified framework. By adhering to the setup guidelines and preparing adequately, users can orchestrate the deployment process, ensuring that the Private Action Runner functions optimally and integrates seamlessly with Datadog’s App Builder.

13. Resolve CORS Errors

During testing, users may encounter cross-origin resource sharing (CORS) errors, which stem from browser security mechanisms that restrict web applications from accessing resources across different domains. Resolving these CORS errors involves configuring the application load balancer’s (ALB) listener using the ingressClassParams resource in the AWS Load Balancer Controller Helm chart values file.

By specifying the required headers and protocols, users can address these errors, ensuring that the runner responses are correctly routed. Configuration adjustments such as enabling access control allow-origin headers and defining permissible request headers resolve CORS issues, allowing seamless interaction between Datadog’s environment and on-premises systems.

14. Concluding Thoughts: Considerations and Improvements

Datadog’s App Builder is an outstanding tool that significantly extends the functionality of the Datadog platform beyond conventional observability frameworks. It allows users to craft custom applications specifically designed to meet their unique requirements. These applications can range from monitoring solutions to remediation tools and resource management utilities. Nevertheless, organizations with on-premises workloads often encounter substantial challenges when attempting to establish a secure and dependable connection between Datadog’s SaaS environment and their internal infrastructure. This article delves into the complexities of overcoming these hurdles, emphasizing the role of Datadog’s Private Action Runner. By leveraging this tool, organizations can ensure seamless and secure interactions with their private resources. The discussion aims to provide insights and solutions to bridge the gap between Datadog’s cloud-based services and on-premises systems, thus enhancing the overall efficiency and security of organizational IT operations.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later