Datadog Integration
Monitor privileged access with Datadog's unified observability platform for metrics, logs, traces, and security monitoring.
Unified Observability
Monitor privileged access alongside your entire infrastructure in Datadog.
Metrics & Monitoring
Export comprehensive access metrics, session counts, authentication rates, and performance data to Datadog for real-time monitoring with custom dashboards and visualizations.
Log Streaming & Analysis
Stream all audit logs, session data, and security events to Datadog Logs for centralized analysis, correlation, and long-term retention with powerful search capabilities.
Alerting & Notifications
Configure intelligent Datadog monitors to alert on suspicious access patterns, failed authentication attempts, policy violations, and anomalous behavior with multi-channel notifications.
Security Monitoring
Leverage Datadog Security Monitoring to detect threats, track compliance violations, and investigate security incidents with full context from privileged access events.
APM Integration
Correlate application performance with privileged access events through distributed tracing, enabling comprehensive observability across your entire infrastructure and applications.
Custom Dashboards
Build custom Datadog dashboards with TigerAccess metrics and logs to visualize access patterns, track SLOs, monitor usage trends, and create executive reports.
Complete Datadog Integration
Get Started in Minutes
Follow these simple steps to integrate TigerAccess with Datadog.
Create Datadog API Credentials
Generate API and Application keys in Datadog for TigerAccess to send metrics, logs, and events. Configure the appropriate permissions for monitoring and security data.
# In Datadog UI:
# 1. Navigate to Organization Settings > API Keys
# 2. Click "New Key" and name it "TigerAccess Metrics"
# 3. Copy the API key
# 4. Navigate to Organization Settings > Application Keys
# 5. Click "New Key" and name it "TigerAccess"
# 6. Select scopes: metrics_write, logs_write, events_write
# 7. Copy the Application key
# Store credentials securely
export DD_API_KEY="your-api-key-here"
export DD_APP_KEY="your-app-key-here"
export DD_SITE="datadoghq.com" # or datadoghq.eu for EUConfigure TigerAccess Integration
Enable the Datadog integration in TigerAccess and configure which metrics, logs, and events to export. Customize tags and filters for your monitoring needs.
# Configure Datadog integration
tacctl integrations add datadog \
--api-key=${DD_API_KEY} \
--app-key=${DD_APP_KEY} \
--site=${DD_SITE} \
--enable-metrics \
--enable-logs \
--enable-events \
--enable-apm \
--tags="env:production,service:tigeraccess"
# Verify integration status
tacctl integrations status datadog
# Test metrics export
tacctl integrations test datadog --type=metrics
# Configure log filters (optional)
tacctl integrations configure datadog \
--log-level=info \
--include-session-logs \
--include-audit-eventsImport Dashboards & Setup Monitors
Import pre-built TigerAccess dashboards and monitor templates into your Datadog account. Customize alerts for your security and operational needs.
# Download pre-built dashboard templates
curl -O https://docs.tigeraccess.com/datadog/dashboards/overview.json
curl -O https://docs.tigeraccess.com/datadog/dashboards/security.json
curl -O https://docs.tigeraccess.com/datadog/monitors/templates.json
# Import dashboards via Datadog API
for dashboard in *.json; do
curl -X POST "https://api.${DD_SITE}/api/v1/dashboard" \
-H "DD-API-KEY: ${DD_API_KEY}" \
-H "DD-APPLICATION-KEY: ${DD_APP_KEY}" \
-H "Content-Type: application/json" \
-d @"$dashboard"
done
# Or import via Datadog UI:
# Dashboards > New Dashboard > Import Dashboard JSON
# View your TigerAccess dashboards
open "https://app.${DD_SITE}/dashboard/lists"Available Metrics
TigerAccess sends the following metrics to Datadog for monitoring and alerting.
| Metric | Description |
|---|---|
tigeraccess.sessions.active | Number of active sessions |
tigeraccess.sessions.started | Sessions started (counter) |
tigeraccess.sessions.duration | Session duration (histogram) |
tigeraccess.auth.attempts | Authentication attempts |
tigeraccess.auth.failures | Failed authentication attempts |
tigeraccess.access.requests | Access requests created |
tigeraccess.access.approvals | Access requests approved |
tigeraccess.policy.violations | Policy violations detected |
Real-World Scenarios
Unified Observability
Monitor privileged access activities in real-time alongside your infrastructure metrics, application performance, and logs in unified Datadog dashboards. Gain complete visibility into who accessed what resources, when, and why, all correlated with your existing monitoring data for comprehensive observability.
Security Operations & Threat Detection
Set up intelligent alerts for unusual access patterns, failed authentication attempts, privilege escalations, and policy violations using Datadog monitors and Security Monitoring. Detect insider threats, compromised credentials, and anomalous behavior with machine learning-powered anomaly detection and automated threat investigation.
Compliance & Audit Reporting
Maintain comprehensive audit trails in Datadog Logs for compliance with SOC 2, PCI DSS, HIPAA, and other regulatory requirements. Generate detailed reports showing who accessed sensitive systems, track privileged session durations, and prove compliance with access policies through historical data analysis and custom dashboards.
Performance Analysis & Incident Response
Correlate privileged access events with application errors, infrastructure issues, and security incidents for faster root cause analysis. Use distributed tracing to understand how privileged operations impact application performance, track deployment changes, and investigate incidents with full context from access logs, metrics, and APM data.
Frequently Asked Questions
What metrics does TigerAccess export to Datadog?
TigerAccess exports comprehensive metrics including active sessions, session start/end counts, authentication attempts and failures, access request metrics, policy evaluation results, certificate issuance rates, protocol-specific connection metrics, and performance data. All metrics include rich tags for filtering by user, resource type, protocol, environment, and outcome, enabling granular monitoring and analysis.
How are audit logs structured in Datadog?
TigerAccess sends audit logs to Datadog in structured JSON format with standardized fields including timestamp, event type, user identity, resource accessed, action performed, outcome, source IP, session ID, and full context metadata. Logs are automatically parsed and indexed with facets, making them easy to search, filter, correlate, and analyze in Datadog Log Explorer. Long-term retention policies can be configured for compliance.
Can I create custom monitors and alerts for security events?
Yes. All TigerAccess metrics and logs are available in Datadog for creating custom monitors, alerts, and SLOs. We provide pre-built monitor templates for common security scenarios like failed authentication attempts, privilege escalations, unusual access patterns, and policy violations. You can customize thresholds, notification channels (PagerDuty, Slack, email), and alert conditions to match your security operations workflow.
Does the integration support Datadog APM and distributed tracing?
Yes. TigerAccess integrates with Datadog APM to provide distributed tracing for privileged access operations. This enables correlation of access events with application performance, allowing you to understand how privileged operations impact your applications, track deployment changes, and investigate incidents with full context from traces, metrics, and logs in a unified view.
How does the Datadog integration help with compliance and audit reporting?
The integration provides comprehensive audit trails in Datadog Logs that meet compliance requirements for SOC 2, PCI DSS, HIPAA, and other regulations. You can generate detailed reports showing privileged access history, create custom dashboards for compliance reviews, set up retention policies for audit data, and use Datadog's search and analytics capabilities to prove compliance with access policies and security controls during audits.
Ready to Secure Your Infrastructure?
Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.
No credit card required • 14-day free trial • Enterprise support available