Back to Integrations

Datadog Integration

Monitor privileged access with Datadog's unified observability platform for metrics, logs, traces, and security monitoring.

Features

Unified Observability

Monitor privileged access alongside your entire infrastructure in Datadog.

Metrics & Monitoring

Send access metrics, session counts, and performance data to Datadog for real-time monitoring and dashboards.

Log Management

Stream all audit logs and session data to Datadog Logs for centralized analysis and correlation.

Alerting & Notifications

Configure Datadog monitors to alert on suspicious access patterns, failed attempts, and policy violations.

APM Integration

Correlate application performance with privileged access events for comprehensive observability.

Capabilities

Complete Datadog Integration

Custom metrics
Log streaming
Pre-built dashboards
Monitor templates
Service checks
Event tracking
Distributed tracing
Security monitoring
Anomaly detection
SLO tracking
Custom tags
Team integration
Setup

Get Started in Minutes

Follow these simple steps to integrate TigerAccess with Datadog.

1

Get Datadog API Key

Create an API key in Datadog for TigerAccess to send metrics and logs.

# In Datadog:
1. Navigate to Organization Settings > API Keys
2. Click "New Key"
3. Name: "TigerAccess"
4. Copy the API key
2

Configure Integration

Add the Datadog integration in TigerAccess with your API key and configure data sources.

tacctl integrations add datadog \
  --api-key=<your-api-key> \
  --site=datadoghq.com \
  --enable-metrics \
  --enable-logs \
  --enable-events
3

Import Dashboards

Import pre-built TigerAccess dashboards into your Datadog account.

# Download dashboard JSON from TigerAccess docs
# Import via Datadog UI: Dashboards > New Dashboard > Import

# Or use the API:
curl -X POST "https://api.datadoghq.com/api/v1/dashboard" \
  -H "DD-API-KEY: ${DD_API_KEY}" \
  -H "Content-Type: application/json" \
  -d @tigeraccess-dashboard.json
Metrics

Available Metrics

TigerAccess sends the following metrics to Datadog for monitoring and alerting.

MetricDescription
tigeraccess.sessions.activeNumber of active sessions
tigeraccess.sessions.startedSessions started (counter)
tigeraccess.sessions.durationSession duration (histogram)
tigeraccess.auth.attemptsAuthentication attempts
tigeraccess.auth.failuresFailed authentication attempts
tigeraccess.access.requestsAccess requests created
tigeraccess.access.approvalsAccess requests approved
tigeraccess.policy.violationsPolicy violations detected
Use Cases

Real-World Scenarios

Real-Time Monitoring

Monitor privileged access activities in real-time alongside your infrastructure metrics, applications, and logs in unified Datadog dashboards.

Security Alerting

Set up alerts for unusual access patterns, failed login attempts, policy violations, and other security events with Datadog monitors.

Capacity Planning

Track session counts, connection metrics, and resource usage to plan capacity and identify performance bottlenecks.

Incident Correlation

Correlate privileged access events with application errors, infrastructure issues, and security incidents for faster root cause analysis.

FAQ

Frequently Asked Questions

What metrics does TigerAccess send to Datadog?

TigerAccess sends comprehensive metrics including session counts, authentication attempts, access request metrics, policy evaluations, and performance data. All metrics include tags for filtering by user, resource type, protocol, and outcome.

Can I create custom monitors for TigerAccess metrics?

Yes. All TigerAccess metrics are available in Datadog and can be used to create custom monitors, alerts, and SLOs. We provide example monitor templates to get you started quickly.

How are logs structured in Datadog?

TigerAccess logs are sent in JSON format with standardized fields and attributes. Logs are automatically parsed and indexed, making them easy to search, filter, and analyze in Datadog Log Explorer.

Does TigerAccess support Datadog Events?

Yes. Important events like access approvals, policy changes, security violations, and system alerts are sent as Datadog Events, appearing in your Event Stream and correlating with other monitoring data.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available