Note: The Datadog integration requires the Greenhouse Recruiting Audit Log add-on.
Datadog provides a unified observability and security platform that delivers real-time insights across cloud applications, infrastructure, and services.
Datadog’s integration with Greenhouse Recruiting collects audit logs that represent important events and configuration changes within Greenhouse, enabling teams to detect incidents and minimize their impact. These logs are parsed and enriched through the built-in logs pipeline, which enables search and analysis. The integration also provides insight into activities on the Greenhouse platform through the out-of-the-box dashboards.
Create a Harvest API key
To configure the integration, you’ll need to create a Harvest API key.
Follow the steps in this article to create the key, and verify that the permissions below are selected when configuring the Datadog integration.
Credentials
In the Create New Credential box, make the following selections:
- API Type: Harvest
- Partner: Datadog or Unlisted Vendor
- Description: Datadog Harvest API Key
Permissions
Verify that the following permissions are selected for the Datadog integration:
- Audit Log
Add API key in Datadog
Navigate to the Greenhouse integration tile in Datadog, enter your API key, and click Save. Datadog will begin ingesting audit logs automatically. The integration ingests audit logs and displays them in an out-of-the-box dashboard and couples them with out-of-the-box detection rules.
Use the integration
Find the dashboard by navigating to the Dashboards tab on the left hand side. From here, you can search “Greenhouse” to find the audit log dashboard. This dashboard provides an overview of Greenhouse audit logs, aggregating user activities, security events and compliance actions with filtering and querying for detailed event analysis and monitoring (note that the dashboard example below isn’t populated with real data yet, so won’t show anything)
Next, we’ll go to the log explorer which is where all of our logs are sent. We won’t see any Greenhouse audit logs right now, but if you filter for “source:Greenhouse” with real data, you’ll be able to see this.
Lastly, we’ve built an OOTB detection rule, which you can find by navigating to “Security” then “Detection Rules” within “Cloud SIEM”. This rule will alert users if there’s a sudden spike in PII access.
Additional resources
For additional information or troubleshooting not covered here, reach out to shreya.batra@datadoghq.com