Skip to content

Conversation

@vrajpatel-crest
Copy link
Contributor

What does this PR do?

  • Add Whitelist Datadog IP Addresses section in readme.

Review checklist (to be filled by reviewers)

  • Feature or bugfix MUST have appropriate tests (unit, integration, e2e)
  • Add the qa/skip-qa label if the PR doesn't need to be tested during QA.
  • If you need to backport this PR to another branch, you can add the backport/<branch-name> label to the PR and it will automatically open a backport PR once this one is merged

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

Comment on lines 48 to 59
1. Use an API platform such as Postman, or curl to make a GET request to the [Datadog API endpoint][3].
2. Once you receive the response, locate the **webhooks** section in the JSON. It will look something like this:
```json
"webhooks": {
"prefixes_ipv4": [
"0.0.0.0/32",
...
],
"prefixes_ipv6": []
}
```
3. From the **prefixes_ipv4** list under the Webhooks section, copy each CIDR entry.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Use log intake IP ranges instead of webhook IP ranges

The new whitelisting steps direct users to copy webhooks.prefixes_ipv4 from the IP-ranges endpoint. Those addresses are only used when Datadog sends outbound webhooks, not when external services post logs to Datadog. For organizations opening their firewalls so Cofense Triage can send data to Datadog, whitelisting the webhook CIDRs will still block traffic to the log ingestion/API endpoints and the integration will fail. This section should reference the logs (and/or api) ranges from the same response instead of webhooks.

Useful? React with 👍 / 👎.

Copy link
Contributor

@maycmlee maycmlee left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just a couple of suggestions


#### Whitelist Datadog IP Addresses

1. Use an API platform such as Postman, or curl to make a GET request to the [Datadog API endpoint][3].
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Use an API platform such as Postman, or curl to make a GET request to the [Datadog API endpoint][3].
1. Use an API platform such as Postman or the curl command to make a GET request to the [Datadog API endpoint][3].

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

#### Whitelist Datadog IP Addresses

1. Use an API platform such as Postman, or curl to make a GET request to the [Datadog API endpoint][3].
2. Once you receive the response, locate the **webhooks** section in the JSON. It will look something like this:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
2. Once you receive the response, locate the **webhooks** section in the JSON. It will look something like this:
2. After you receive the response, locate the **webhooks** section in the JSON. It looks something like this:

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

}
```
3. From the **prefixes_ipv4** list under the Webhooks section, copy each CIDR entry.
4. Work with Cofense Support team to get these IP ranges whitelisted.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
4. Work with Cofense Support team to get these IP ranges whitelisted.
4. Work with Cofense support team to get these IP ranges whitelisted.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

@github-actions
Copy link

github-actions bot commented Nov 5, 2025

⚠️ Recommendation: Add qa/skip-qa label

This PR does not modify any files shipped with the agent.

To help streamline the release process, please consider adding the qa/skip-qa label if these changes do not require QA testing.

@gunterd gunterd added this pull request to the merge queue Nov 7, 2025
Merged via the queue into DataDog:master with commit 9c5850c Nov 7, 2025
64 of 65 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants