You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* merge: (30 commits)
Revert "Update minimum Ruby tracer version for dynamic instrumentation to 2.9.0 (#27233)"
Update custom-javascript-assertion.md (#26973)
[DOCS-9908] Update RUM react initialization parameter (#27231)
Update minimum Ruby tracer version for dynamic instrumentation to 2.9.0 (#27233)
(DOCS-9604) Update images and text to match new panel style (#27173)
Bump otel-agent version to 7.61 (#27221)
Add note about key validation delay to API and Application keys docum… (#27210)
Add support for vulnerability management - GetSBOM new endpoint (#27128)
[ACCESS-3116] Show display name of permissions on permissions page (#27218)
[DOCS-9912] Remove SDS via agent (#27215)
[SDCI-880] Add K8s explanation for infra correlation for Gitlab (#27061)
[AWSX] Update AWS integration role documentation (#27205)
Include Weaver as a supported framework in Test Optimization for Java (#27152)
(DOCS-9872) Add docs for Form component (#27118)
OTel Troubleshooting Update (#27010)
DOCS-9641 Take 2 (#27213)
init (#27212)
Updates the language on the serverless init cloud run page to push customers to use the sidecar (#27101)
add additional note to the getlog limitation (#27209)
fix ref numbers (#27206)
...
Copy file name to clipboardExpand all lines: content/en/account_management/org_settings/oauth_apps.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -14,13 +14,13 @@ Use the **OAuth Apps** management page under [Organization Settings][1] to manag
14
14
## Setup
15
15
### Permissions
16
16
17
-
By default, users with [Datadog Standard and Datadog Admin roles][2] can access the OAuth Apps management page. If your organization has [custom roles][3] defined, add your user to any custom role with `org_authorized_apps_read` and `org_authorized_apps_write` permissions.
17
+
By default, users with the [Datadog Admin role][2] can access the OAuth Apps management page. If your organization has [custom roles][3] defined, add your user to any custom role with the `org_management` permission.
18
18
19
-
Only users with the Datadog Admin role or the `org_authorized_apps_write` permission can manage OAuth applications on this page, such as disabling applications or revoking OAuth access for a user.
19
+
Only users with the Datadog Admin role or the `org_management` permission can manage OAuth applications on this page, such as disabling applications or revoking OAuth access for a user.
20
20
21
21
### Enable
22
22
23
-
Enabled OAuth applications allow users with necessary permissions to authorize access on their behalf. OAuth applications include the Datadog Mobile App<!-- and your custom [UI Extensions][4] that have [OAuth API Access][5]-->.
23
+
Enabled OAuth applications allow users with necessary permissions to authorize access on their behalf. OAuth applications include the Datadog Mobile App<!-- and your custom [UI Extensions][4] that have [OAuth API Access][5]-->.
Sensitive Data Scanner using the Agent is in Preview. See the <a href="https://www.datadoghq.com/blog/sensitive-data-scanner-using-the-datadog-agent/">blog post</a> and <a href="https://docs.datadoghq.com/sensitive_data_scanner/">documentation</a> for more information. To request access, fill out this form.
263
-
{{< /callout >}}
264
-
265
261
If your logs contain sensitive information that need redacting, configure the Datadog Agent to scrub sensitive sequences by using the `log_processing_rules` parameter in your configuration file with the `mask_sequences` type.
266
262
267
263
This replaces all matched groups with the value of the `replace_placeholder` parameter.
Copy file name to clipboardExpand all lines: content/en/continuous_integration/pipelines/gitlab.md
+49-39
Original file line number
Diff line number
Diff line change
@@ -20,27 +20,27 @@ further_reading:
20
20
21
21
## Overview
22
22
23
-
[GitLab][19] is a DevOps platform that automates the software development lifecycle with integrated CI/CD features, enabling you to deploy applications quickly and securely.
23
+
[GitLab][18] is a DevOps platform that automates the software development lifecycle with integrated CI/CD features, enabling automated, continuous deployment of applications with built-in security controls.
24
24
25
25
Set up tracing in GitLab to collect data on your pipeline executions, analyze performance bottlenecks, troubleshoot operational issues, and optimize your deployment workflows.
26
26
27
27
### Compatibility
28
28
29
29
| Pipeline Visibility | Platform | Definition |
30
30
|---|---|---|
31
-
|[Running pipelines][25]| Running pipelines | View pipeline executions that are running. Queued or waiting pipelines show with status "Running" on Datadog. |
|[Queue time][22]| Queue time | View the amount of time pipeline jobs sit in the queue before processing. |
31
+
|[Running pipelines][24]| Running pipelines | View pipeline executions that are running. Queued or waiting pipelines show with status "Running" on Datadog. |
|[Approval wait time][23]| Approval wait time | View the amount of time jobs and pipelines wait for manual approvals. |
42
-
|[Execution time][24]| Execution time | View the amount of time pipelines have been running jobs. Gitlab refers to this metric as `duration`. Duration in Gitlab and execution time may show different values. Gitlab does not take into consideration jobs that failed due to certain kinds of failures (such as runner system failures). |
43
-
|[Custom spans][26]| Custom spans | Configure custom spans for your pipelines. |
41
+
|[Approval wait time][22]| Approval wait time | View the amount of time jobs and pipelines wait for manual approvals. |
42
+
|[Execution time][23]| Execution time | View the amount of time pipelines have been running jobs. Gitlab refers to this metric as `duration`. Duration in Gitlab and execution time may show different values. Gitlab does not take into consideration jobs that failed due to certain kinds of failures (such as runner system failures). |
43
+
|[Custom spans][25]| Custom spans | Configure custom spans for your pipelines. |
44
44
45
45
The following GitLab versions are supported:
46
46
@@ -253,34 +253,46 @@ If you are using self-hosted GitLab runners, you can correlate jobs with the inf
253
253
254
254
Datadog infrastructure correlation is possible using different methods:
255
255
256
-
#### Tagging runners with hostname
257
-
258
-
The GitLab runner must have a tag of the form `host:<hostname>`. Tags can be added while [registering a new runner][6]. As a result, this method is only available when the runner is directly running the job.
256
+
{{< tabs >}}
257
+
{{% tab "Non autoscaling executors" %}}
258
+
The GitLab runner must have a tag in the form `host:<hostname>`. Tags can be added while [registering a new runner][1]. As a result, this method is only available when the runner is directly running the job.
259
259
260
260
This excludes executors that are autoscaling the infrastructure in order to run the job (such as the Kubernetes, Docker Autoscaler, or Instance executors) as it is not possible to add tags dynamically for those runners.
261
261
262
262
For existing runners:
263
263
264
-
{{< tabs >}}
265
-
{{% tab "GitLab >= 15.8" %}}
266
-
Add tags through the UI by going to **Settings > CI/CD > Runners** and editing the appropriate runner.
264
+
- GitLab >= 15.8: Add tags through the UI by going to **Settings > CI/CD > Runners** and editing the appropriate runner.
265
+
266
+
- GitLab < 15.8: Add tags by updating the runner's `config.toml`. Or add tags through the UI by going to **Settings > CI/CD > Runners** and editing the appropriate runner.
267
+
268
+
After these steps, CI Visibility adds the hostname to each job. To see the metrics, click on a job span in the trace view. In the drawer, a new tab named **Infrastructure** appears which contains the host metrics.
269
+
270
+
[1]: https://docs.gitlab.com/runner/register/
267
271
{{% /tab %}}
268
272
269
-
{{% tab "GitLab < 15.8" %}}
270
-
Add tags by updating the runner's `config.toml`. Or add tags
271
-
through the UI by going to **Settings > CI/CD > Runners** and editing the appropriate runner.
273
+
{{% tab "Docker Autoscaler" %}}
274
+
CI Visibility supports Infrastructure metrics for "Docker Autoscaler" executors. For more information, see the [Correlate Infrastructure Metrics with GitLab Jobs guide][1].
After these steps, CI Visibility adds the hostname to each job. To see the metrics, click on a job span in the trace view. In the drawer, a new tab named **Infrastructure** appears which contains the host metrics.
279
+
{{% tab "Instance" %}}
280
+
CI Visibility supports Infrastructure metrics for "Instance" executors. For more information, see the [Correlate Infrastructure Metrics with GitLab Jobs guide][1].
CI Visibility also supports Infrastructure metrics for "Instance" and "Docker Autoscaler" executors. For more information, see the [Correlate Infrastructure Metrics with GitLab Jobs guide][18].
285
+
{{% tab "Kubernetes" %}}
286
+
CI Visibility supports Infrastructure metrics for the Kubernetes executor. For this, it is necessary to have the Datadog Agent monitoring the Kubernetes Gitlab infrastructure. See [Install the Datadog Agent on Kubernetes][1] to install the Datadog Agent in a Kubernetes cluster.
CI Visibility does not support Infrastructure metrics for other executors such as the Kubernetes executor.
291
+
{{% tab "Other executors" %}}
292
+
CI Visibility does not support Infrastructure metrics for other executors.
293
+
{{% /tab %}}
294
+
295
+
{{< /tabs >}}
284
296
285
297
### View error messages for pipeline failures
286
298
@@ -366,13 +378,13 @@ The <a href="https://docs.gitlab.com/ee/administration/object_storage.html#amazo
366
378
{{% /tab %}}
367
379
{{< /tabs >}}
368
380
369
-
Logs are billed separately from CI Visibility. Log retention, exclusion, and indexes are configured in [Log Management][29]. Logs for GitLab jobs can be identified by the `datadog.product:cipipeline` and `source:gitlab` tags.
381
+
Logs are billed separately from CI Visibility. Log retention, exclusion, and indexes are configured in [Log Management][6]. Logs for GitLab jobs can be identified by the `datadog.product:cipipeline` and `source:gitlab` tags.
370
382
371
383
For more information about processing job logs collected from the GitLab integration, see the [Processors documentation][17].
372
384
373
385
## View partial and downstream pipelines
374
386
375
-
You can use the following filters to customize your search query in the [CI Visibility Explorer][27].
387
+
You can use the following filters to customize your search query in the [CI Visibility Explorer][26].
376
388
377
389
{{< img src="ci/partial_retries_search_tags.png" alt="The Pipeline executions page with Partial Pipeline:retry entered in the search query" style="width:100%;">}}
378
390
@@ -390,7 +402,7 @@ You can also apply these filters using the facet panel on the left hand side of
390
402
391
403
Once the integration is successfully configured, the [**CI Pipeline List**][4] and [**Executions**][5] pages populate with data after the pipelines finish.
392
404
393
-
The **CI Pipeline List** page shows data for only the default branch of each repository. For more information, see [Search and Manage CI Pipelines][28].
405
+
The **CI Pipeline List** page shows data for only the default branch of each repository. For more information, see [Search and Manage CI Pipelines][27].
394
406
395
407
## Further reading
396
408
@@ -401,7 +413,7 @@ The **CI Pipeline List** page shows data for only the default branch of each rep
0 commit comments