Observability

This product is not supported for your selected Datadog site. ().

Overview

The Observability overlay shows where the Datadog Agent is installed and what features are enabled per host, such as Application Performance Monitoring (APM), Cloud Network Monitoring (CNM), Log Management, and more. This helps you to assess visibility gaps across your environment.

Take action on resources

On the Observability overlay, you can take action on individual resources or groups of resources:

  • Click a single host to open a side panel with direct links to Fleet Automation, where you can deploy configurations or upgrade the Agent.
  • Click a resource group, such as a subnet or VPC, to open a side panel that allows you to apply bulk updates across all the hosts in that resource group.
  • To select multiple (but not all) hosts, hold down the Command key on Mac or the Control key on Windows while clicking on each host.

View Datadog coverage

In the bottom left legend, the View Datadog coverage by dropdown allows you to inspect the installation status for specific features. Each row shows:

  • Feature name (for example, APM, Logs, CNM)
  • Numerical coverage: X / Y (for example, 16/35), where:
    • X is the number of resources with that feature enabled
    • Y is the total number of relevant resources in the current view or filter

Legend

Pin ColorDescription
GreenAgent and feature are both enabled
GrayFeature is not enabled
YellowAgent is installed but needs an upgrade to enable all features

Tracked features

The observability overlay tracks coverage for the following products:

FeatureDescription
Agent versionVerifies if the Datadog Agent is installed and its version
APMApplication Performance Monitoring (traces collected)
CNMCloud Network Monitoring coverage
LogsLog Management collection status
CWSCloud Workload Protection coverage
CSPMCloud Security Misconfigurations coverage
ProcessProcess monitoring enabled
CSM VM HostsCoverage of Cloud Security Vulnerabilities on hosts
CSM VM ContainersCoverage of Cloud Security Vulnerabilities on containers
USMCoverage of Universal Service Monitoring

Further reading