Datadog Log Management

Modern log management & analytics

Rapid Troubleshooting

Search, filter, and analyze logs on the fly—no complex query language required.

  • Analyze logs with out-of-the-box interactive dashboards and drag-and-drop data visualizations.
  • Jump start exploration with Log Patterns, which intelligently surfaces trends in log activity.
  • Drill deeper with Pattern Inspector to understand at a glance the distribution of values within each pattern.
  • For time sensitive issues, automatically identify Log Anomalies using Watchdog Insights.

Centralized Processing & Routing

  • Leverage out-of-the-box log processing pipelines for 200+ common technologies.
  • Build consistent, structured datasets from your raw log data, no matter the source.
  • Enrich ingested logs with custom reference data to add more context and make them more actionable.
  • Centralize routing of processed logs to 3rd party destinations such as your data lake or SIEM vendor using Log Forwarding.

Logging without Limits™

  • Ingest, Live Tail, Live Search, flexibly store, and archive everything. Decide which logs are most useful to retain (and for how long); change your mind anytime.
  • Generate metrics from all logs (regardless of whether they're indexed) to track trends and KPIs.
  • Rehydrate logs from your compressed log archives and access them in Datadog to support audits or investigations.
  • Perform simple or complex log queries directly on Flex Logs in Datadog, including extended retention options.

Flex Logs

  • Leverage Flex Logs to adjust your retention and querying capacity independently, fulfilling even more use cases than standard retention.
  • Meet your budget and users’ query needs while reducing the number of places logs need to be stored.
  • Maximize full storage and investigation into any log type.
  • Make both simple and complex queries on all stored logs with the full capabilities of the Log Explorer, which is purpose-built for querying logs.

Full Observability

  • Pivot from logs to the corresponding APM traces with a single click for full context.
  • Jump directly from logs to triggered security signals without switching tools or contexts.
  • Easily navigate from dashboards to associated logs for faster troubleshooting.

Enterprise-ready

  • Manage access to your log data with granular RBAC controls that can be scoped to fit your organization’s structures and roles.
  • Scale with confidence—send and process millions of logs per minute or petabytes per month seamlessly.
  • Supports PCI and HIPAA compliance.