This product is not supported for your selected
Datadog site. (
).
Overview
The Observability overlay shows where the Datadog Agent is installed and what features are enabled per host, such as Application Performance Monitoring (APM), Cloud Network Monitoring (CNM), Log Management, and more. This helps you to assess visibility gaps across your environment.
Take action on resources
On the Observability overlay, you can take action on individual resources or groups of resources:
- Click a single host to open a side panel with direct links to Fleet Automation, where you can deploy configurations or upgrade the Agent.
- Click a resource group, such as a subnet or VPC, to open a side panel that allows you to apply bulk updates across all the hosts in that resource group.
- To select multiple (but not all) hosts, hold down the Command key on Mac or the Control key on Windows while clicking on each host.
View Datadog coverage
In the bottom left legend, the View Datadog coverage by dropdown allows you to inspect the installation status for specific features. Each row shows:
- Feature name (for example, APM, Logs, CNM)
- Numerical coverage: X / Y (for example, 16/35), where:
- X is the number of resources with that feature enabled
- Y is the total number of relevant resources in the current view or filter
Legend
| Pin Color | Description |
|---|
| Green | Agent and feature are both enabled |
| Gray | Feature is not enabled |
| Yellow | Agent is installed but needs an upgrade to enable all features |
Tracked features
The observability overlay tracks coverage for the following products:
| Feature | Description |
|---|
| Agent version | Verifies if the Datadog Agent is installed and its version |
| APM | Application Performance Monitoring (traces collected) |
| CNM | Cloud Network Monitoring coverage |
| Logs | Log Management collection status |
| CWS | Cloud Workload Protection coverage |
| CSPM | Cloud Security Misconfigurations coverage |
| Process | Process monitoring enabled |
| CSM VM Hosts | Coverage of Cloud Security Vulnerabilities on hosts |
| CSM VM Containers | Coverage of Cloud Security Vulnerabilities on containers |
| USM | Coverage of Universal Service Monitoring |
Further reading
Additional helpful documentation, links, and articles: