Back to Integrations

Datadog Integration

Monitor privileged access with Datadog's unified observability platform for metrics, logs, traces, and security monitoring.

Features

Unified Observability

Monitor privileged access alongside your entire infrastructure in Datadog.

Metrics & Monitoring

Export comprehensive access metrics, session counts, authentication rates, and performance data to Datadog for real-time monitoring with custom dashboards and visualizations.

Log Streaming & Analysis

Stream all audit logs, session data, and security events to Datadog Logs for centralized analysis, correlation, and long-term retention with powerful search capabilities.

Alerting & Notifications

Configure intelligent Datadog monitors to alert on suspicious access patterns, failed authentication attempts, policy violations, and anomalous behavior with multi-channel notifications.

Security Monitoring

Leverage Datadog Security Monitoring to detect threats, track compliance violations, and investigate security incidents with full context from privileged access events.

APM Integration

Correlate application performance with privileged access events through distributed tracing, enabling comprehensive observability across your entire infrastructure and applications.

Custom Dashboards

Build custom Datadog dashboards with TigerAccess metrics and logs to visualize access patterns, track SLOs, monitor usage trends, and create executive reports.

Capabilities

Complete Datadog Integration

Real-time metrics export
Structured log streaming
Pre-built dashboards
Custom monitor templates
Service checks & health monitoring
Event tracking & correlation
Distributed tracing integration
Security monitoring & threat detection
Anomaly detection & alerting
SLO tracking & reporting
Custom tags & metadata
Team collaboration & notifications
Multi-region support
Historical data analysis
Integration with Datadog APM
Webhook & API integrations
Setup

Get Started in Minutes

Follow these simple steps to integrate TigerAccess with Datadog.

1

Create Datadog API Credentials

Generate API and Application keys in Datadog for TigerAccess to send metrics, logs, and events. Configure the appropriate permissions for monitoring and security data.

# In Datadog UI:
# 1. Navigate to Organization Settings > API Keys
# 2. Click "New Key" and name it "TigerAccess Metrics"
# 3. Copy the API key

# 4. Navigate to Organization Settings > Application Keys
# 5. Click "New Key" and name it "TigerAccess"
# 6. Select scopes: metrics_write, logs_write, events_write
# 7. Copy the Application key

# Store credentials securely
export DD_API_KEY="your-api-key-here"
export DD_APP_KEY="your-app-key-here"
export DD_SITE="datadoghq.com"  # or datadoghq.eu for EU
2

Configure TigerAccess Integration

Enable the Datadog integration in TigerAccess and configure which metrics, logs, and events to export. Customize tags and filters for your monitoring needs.

# Configure Datadog integration
tacctl integrations add datadog \
  --api-key=${DD_API_KEY} \
  --app-key=${DD_APP_KEY} \
  --site=${DD_SITE} \
  --enable-metrics \
  --enable-logs \
  --enable-events \
  --enable-apm \
  --tags="env:production,service:tigeraccess"

# Verify integration status
tacctl integrations status datadog

# Test metrics export
tacctl integrations test datadog --type=metrics

# Configure log filters (optional)
tacctl integrations configure datadog \
  --log-level=info \
  --include-session-logs \
  --include-audit-events
3

Import Dashboards & Setup Monitors

Import pre-built TigerAccess dashboards and monitor templates into your Datadog account. Customize alerts for your security and operational needs.

# Download pre-built dashboard templates
curl -O https://docs.tigeraccess.com/datadog/dashboards/overview.json
curl -O https://docs.tigeraccess.com/datadog/dashboards/security.json
curl -O https://docs.tigeraccess.com/datadog/monitors/templates.json

# Import dashboards via Datadog API
for dashboard in *.json; do
  curl -X POST "https://api.${DD_SITE}/api/v1/dashboard" \
    -H "DD-API-KEY: ${DD_API_KEY}" \
    -H "DD-APPLICATION-KEY: ${DD_APP_KEY}" \
    -H "Content-Type: application/json" \
    -d @"$dashboard"
done

# Or import via Datadog UI:
# Dashboards > New Dashboard > Import Dashboard JSON

# View your TigerAccess dashboards
open "https://app.${DD_SITE}/dashboard/lists"
Metrics

Available Metrics

TigerAccess sends the following metrics to Datadog for monitoring and alerting.

MetricDescription
tigeraccess.sessions.activeNumber of active sessions
tigeraccess.sessions.startedSessions started (counter)
tigeraccess.sessions.durationSession duration (histogram)
tigeraccess.auth.attemptsAuthentication attempts
tigeraccess.auth.failuresFailed authentication attempts
tigeraccess.access.requestsAccess requests created
tigeraccess.access.approvalsAccess requests approved
tigeraccess.policy.violationsPolicy violations detected
Use Cases

Real-World Scenarios

Unified Observability

Monitor privileged access activities in real-time alongside your infrastructure metrics, application performance, and logs in unified Datadog dashboards. Gain complete visibility into who accessed what resources, when, and why, all correlated with your existing monitoring data for comprehensive observability.

Security Operations & Threat Detection

Set up intelligent alerts for unusual access patterns, failed authentication attempts, privilege escalations, and policy violations using Datadog monitors and Security Monitoring. Detect insider threats, compromised credentials, and anomalous behavior with machine learning-powered anomaly detection and automated threat investigation.

Compliance & Audit Reporting

Maintain comprehensive audit trails in Datadog Logs for compliance with SOC 2, PCI DSS, HIPAA, and other regulatory requirements. Generate detailed reports showing who accessed sensitive systems, track privileged session durations, and prove compliance with access policies through historical data analysis and custom dashboards.

Performance Analysis & Incident Response

Correlate privileged access events with application errors, infrastructure issues, and security incidents for faster root cause analysis. Use distributed tracing to understand how privileged operations impact application performance, track deployment changes, and investigate incidents with full context from access logs, metrics, and APM data.

FAQ

Frequently Asked Questions

What metrics does TigerAccess export to Datadog?

TigerAccess exports comprehensive metrics including active sessions, session start/end counts, authentication attempts and failures, access request metrics, policy evaluation results, certificate issuance rates, protocol-specific connection metrics, and performance data. All metrics include rich tags for filtering by user, resource type, protocol, environment, and outcome, enabling granular monitoring and analysis.

How are audit logs structured in Datadog?

TigerAccess sends audit logs to Datadog in structured JSON format with standardized fields including timestamp, event type, user identity, resource accessed, action performed, outcome, source IP, session ID, and full context metadata. Logs are automatically parsed and indexed with facets, making them easy to search, filter, correlate, and analyze in Datadog Log Explorer. Long-term retention policies can be configured for compliance.

Can I create custom monitors and alerts for security events?

Yes. All TigerAccess metrics and logs are available in Datadog for creating custom monitors, alerts, and SLOs. We provide pre-built monitor templates for common security scenarios like failed authentication attempts, privilege escalations, unusual access patterns, and policy violations. You can customize thresholds, notification channels (PagerDuty, Slack, email), and alert conditions to match your security operations workflow.

Does the integration support Datadog APM and distributed tracing?

Yes. TigerAccess integrates with Datadog APM to provide distributed tracing for privileged access operations. This enables correlation of access events with application performance, allowing you to understand how privileged operations impact your applications, track deployment changes, and investigate incidents with full context from traces, metrics, and logs in a unified view.

How does the Datadog integration help with compliance and audit reporting?

The integration provides comprehensive audit trails in Datadog Logs that meet compliance requirements for SOC 2, PCI DSS, HIPAA, and other regulations. You can generate detailed reports showing privileged access history, create custom dashboards for compliance reviews, set up retention policies for audit data, and use Datadog's search and analytics capabilities to prove compliance with access policies and security controls during audits.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available