You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/agent/logs/log_transport.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ further_reading:
20
20
---
21
21
22
22
23
-
## Default agent behavior
23
+
## Default Agent behavior
24
24
25
25
For Agent v6.19+/v7.19+, the default transport used for your logs is compressed HTTPS instead of TCP for the previous versions.
26
26
When the Agent starts, if log collection is enabled, it runs a HTTPS connectivity test. If successful, then the Agent uses the compressed HTTPS transport, otherwise the Agent falls back to a TCP transport.
@@ -33,7 +33,7 @@ To check which transport is used by the Agent, run the [Agent status command][1]
33
33
34
34
**Notes**:
35
35
36
-
* For older Agent versions, TCP transport is used by default. Datadog strongly recommends you to enforce HTTPS transport if you are running v6.14+/v7.14+ and HTTPS compression if you are running v6.16+/v7.16+.
36
+
* For older Agent versions, TCP transport is used by default. **Datadog strongly recommends** you to enforce HTTPS transport if you are running v6.14+/v7.14+ and HTTPS compression if you are running v6.16+/v7.16+.
37
37
* Always enforce a specific transport (either TCP or HTTPS) when using a proxy to forwards logs to Datadog
38
38
39
39
## Enforce a specific transport
@@ -111,6 +111,9 @@ When logs are sent through HTTPS, use the same [set of proxy settings][3] as the
Copy file name to clipboardExpand all lines: content/en/logs/guide/docker-logs-collection-troubleshooting-guide.md
-24Lines changed: 0 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,30 +134,6 @@ If the Logs Agent status looks like the example in [Check the Agent status](#che
134
134
* The required port (10516) for sending logs to Datadog is being blocked.
135
135
* Your container is using a different logging driver than the Agent expects.
136
136
137
-
#### Outbound traffic on port 10516 is blocked
138
-
139
-
The Datadog Agent sends its logs to Datadog over TCP using port 10516. If that connection is not available, logs fail to be sent and an error is recorded in the `agent.log` file to that effect.
140
-
141
-
You can manually test your connection using OpenSSL, GnuTLS, or another SSL/TLS client. For OpenSSL, run the following command:
If opening the port 10516 is not an option, it is possible to configure the Datadog Agent to send logs through HTTPS by setting the `DD_LOGS_CONFIG_FORCE_USE_HTTP` environment variable to `true`:
160
-
161
137
#### Your containers are not using the JSON logging driver
162
138
163
139
Docker's default is the json-file logging driver so the Container Agent tries to read from this first. If your containers are set to use a different logging driver, the Logs Agent indicates that it is able to successfully find your containers but it isn't able to collect their logs. The Container Agent can also be configured to read from the journald logging driver.
Copy file name to clipboardExpand all lines: content/en/logs/guide/log-collection-troubleshooting-guide.md
-31Lines changed: 0 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,37 +23,6 @@ There are a number of common issues that can get in the way when [sending new lo
23
23
24
24
Changes in the configuration of the `datadog-agent` won't be taken into account until you have [restarted the Agent][3].
25
25
26
-
## Outbound traffic on port 10516 is blocked
27
-
28
-
The Datadog Agent sends its logs to Datadog over TCP using port 10516. If that connection is not available, logs fail to be sent and an error is recorded in the `agent.log` file to that effect.
29
-
30
-
You can manually test your connection using OpenSSL, GnuTLS, or another SSL/TLS client. For OpenSSL, run the following command:
- If opening the port 10516 is not an option, it is possible to configure the Datadog Agent to send logs through HTTPS by adding the following in `datadog.yaml`:
49
-
50
-
```yaml
51
-
logs_config:
52
-
force_use_http: true
53
-
```
54
-
55
-
See the [HTTPS log forwarding section][4] for more information.
56
-
57
26
## Check the status of the Agent
58
27
59
28
Often, checking the [Agent status command][5] results will help you troubleshoot what is happening.
Copy file name to clipboardExpand all lines: content/en/logs/log_collection/_index.md
+22-96Lines changed: 22 additions & 96 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,11 +154,6 @@ Use the [site][13] selector dropdown on the right side of the page to see suppor
154
154
| US | HTTPS |`agent-http-intake.logs.datadoghq.com`| 443 | Used by the Agent to send logs in JSON format over HTTPS. See the [Host Agent Log collection documentation][2]. |
155
155
| US | HTTPS |`lambda-http-intake.logs.datadoghq.com`| 443 | Used by Lambda functions to send logs in raw, Syslog, or JSON format over HTTPS. |
156
156
| US | HTTPS |`logs.`{{< region-param key="browser_sdk_endpoint_domain" code="true" >}} | 443 | Used by the Browser SDK to send logs in JSON format over HTTPS. |
157
-
| US | TCP | `agent-intake.logs.datadoghq.com` | 10514 | Used by the Agent to send logs without TLS.
158
-
| US | TCP and TLS | `agent-intake.logs.datadoghq.com` | 10516 | Used by the Agent to send logs with TLS.
159
-
| US | TCP and TLS |`intake.logs.datadoghq.com`| 443 | Used by custom forwarders to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. |
160
-
| US | TCP and TLS |`functions-intake.logs.datadoghq.com`| 443 | Used by Azure functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. **Note**: This endpoint may be useful with other cloud providers. |
161
-
| US | TCP and TLS |`lambda-intake.logs.datadoghq.com`| 443 | Used by Lambda functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. |
162
157
163
158
[1]: /api/latest/logs/#send-logs
164
159
[2]: /agent/logs/#send-logs-over-https
@@ -172,9 +167,6 @@ Use the [site][13] selector dropdown on the right side of the page to see suppor
172
167
| EU | HTTPS |`agent-http-intake.logs.datadoghq.eu`| 443 | Used by the Agent to send logs in JSON format over HTTPS. See the [Host Agent Log collection documentation][2]. |
173
168
| EU | HTTPS |`lambda-http-intake.logs.datadoghq.eu`| 443 | Used by Lambda functions to send logs in raw, Syslog, or JSON format over HTTPS. |
174
169
| EU | HTTPS |`logs.`{{< region-param key="browser_sdk_endpoint_domain" code="true" >}} | 443 | Used by the Browser SDK to send logs in JSON format over HTTPS. |
175
-
| EU | TCP and TLS |`agent-intake.logs.datadoghq.eu`| 443 | Used by the Agent to send logs in protobuf format over an SSL-encrypted TCP connection. |
176
-
| EU | TCP and TLS |`functions-intake.logs.datadoghq.eu`| 443 | Used by Azure functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. **Note**: This endpoint may be useful with other cloud providers. |
177
-
| EU | TCP and TLS |`lambda-intake.logs.datadoghq.eu`| 443 | Used by Lambda functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. |
178
170
179
171
[1]: /api/latest/logs/#send-logs
180
172
[2]: /agent/logs/#send-logs-over-https
@@ -252,95 +244,9 @@ Use the [site][13] selector dropdown on the right side of the page to see suppor
252
244
253
245
### Custom log forwarding
254
246
255
-
Any custom process or logging library able to forward logs through **TCP** or **HTTP** can be used in conjunction with Datadog Logs.
256
-
257
-
{{< tabs >}}
258
-
{{% tab "HTTP" %}}
259
-
260
-
You can send logs to Datadog platform over HTTP. Refer to the [Datadog Log HTTP API documentation][1] to get started.
261
-
262
-
[1]: /api/latest/logs/#send-logs
263
-
{{% /tab %}}
264
-
{{% tab "TCP" %}}
265
-
266
-
{{< site-region region="us" >}}
267
-
268
-
You can manually test your connection using OpenSSL, GnuTLS, or another SSL/TLS client. For GnuTLS, run the following command:
You must prefix the log entry with your [Datadog API Key][1] and add a payload.
281
-
282
-
```
283
-
<DATADOG_API_KEY> Log sent directly using TLS
284
-
```
285
-
286
-
Your payload, or `Log sent directly using TLS` as written in the example, can be in raw, Syslog, or JSON format. If your payload is in JSON format, Datadog automatically parses its attributes.
You must prefix the log entry with your [Datadog API Key][1] and add a payload.
247
+
Any custom process or logging library able to forward logs through **HTTP** can be used in conjunction with Datadog Logs.
311
248
312
-
```
313
-
<DATADOG_API_KEY> Log sent directly using TLS
314
-
```
315
-
316
-
Your payload, or `Log sent directly using TLS` as written in the example, can be in raw, Syslog, or JSON format. If your payload is in JSON format, Datadog automatically parses its attributes.
You can send logs to Datadog platform over HTTP. Refer to the [Datadog Log HTTP API documentation][15] to get started.
344
250
345
251
**Notes**:
346
252
@@ -357,6 +263,24 @@ Log events that do not comply with these limits might be transformed or truncate
357
263
358
264
There is an additional truncation in fields that applies only to indexed logs: the value is truncated to 75 KiB for the message field and 25 KiB for non-message fields. Datadog still stores the full text, and it remains visible in regular list queries in the Logs Explorer. However, the truncated version will be displayed when performing a grouped query, such as when grouping logs by that truncated field or performing similar operations that display that specific field.
| US | TCP | `agent-intake.logs.datadoghq.com` | 10514 | Used by the Agent to send logs without TLS.
274
+
| US | TCP and TLS | `agent-intake.logs.datadoghq.com` | 10516 | Used by the Agent to send logs with TLS.
275
+
| US | TCP and TLS |`intake.logs.datadoghq.com`| 443 | Used by custom forwarders to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. |
276
+
| US | TCP and TLS |`functions-intake.logs.datadoghq.com`| 443 | Used by Azure functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. **Note**: This endpoint may be useful with other cloud providers. |
277
+
| US | TCP and TLS |`lambda-intake.logs.datadoghq.com`| 443 | Used by Lambda functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. |
278
+
| EU | TCP and TLS |`agent-intake.logs.datadoghq.eu`| 443 | Used by the Agent to send logs in protobuf format over an SSL-encrypted TCP connection. |
279
+
| EU | TCP and TLS |`functions-intake.logs.datadoghq.eu`| 443 | Used by Azure functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. **Note**: This endpoint may be useful with other cloud providers. |
280
+
| EU | TCP and TLS |`lambda-intake.logs.datadoghq.eu`| 443 | Used by Lambda functions to send logs in raw, Syslog, or JSON format over an SSL-encrypted TCP connection. |
281
+
282
+
{{% /collapse-content %}}
283
+
360
284
### Attributes and tags
361
285
362
286
Attributes prescribe [logs facets][9], which are used for filtering and searching in Log Explorer. See the dedicated [attributes and aliasing][10] documentation for a list of reserved and standard attributes and to learn how to support a naming convention with logs attributes and aliasing.
@@ -407,3 +331,5 @@ Once logs are collected and ingested, they are available in **Log Explorer**. Lo
Copy file name to clipboardExpand all lines: content/en/logs/log_collection/csharp.md
-52Lines changed: 0 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -494,58 +494,6 @@ using (var log = new LoggerConfiguration()
494
494
}
495
495
```
496
496
497
-
{{< site-region region="us" >}}
498
-
499
-
You can also override the default behavior and forward logs in TCP by manually specifying the following required properties: `url`, `port`, `useSSL`, and `useTCP`. Optionally, [specify the `source`, `service`, `host`, and custom tags.][1]
500
-
501
-
For instance to forward logs to the Datadog US region in TCP you would use the following sink configuration:
502
-
503
-
```csharp
504
-
var config = new DatadogConfiguration(url: "intake.logs.datadoghq.com", port: 10516, useSSL: true, useTCP: true);
505
-
using (var log = new LoggerConfiguration()
506
-
.WriteTo.DatadogLogs(
507
-
"<API_KEY>",
508
-
source: "<SOURCE_NAME>",
509
-
service: "<SERVICE_NAME>",
510
-
host: "<HOST_NAME>",
511
-
tags: new string[] {"<TAG_1>:<VALUE_1>", "<TAG_2>:<VALUE_2>"},
You can also override the default behavior and forward logs in TCP by manually specifying the following required properties: `url`, `port`, `useSSL`, and `useTCP`. Optionally, [specify the `source`, `service`, `host`, and custom tags.][1]
526
-
527
-
For instance to forward logs to the Datadog EU region in TCP you would use the following sink configuration:
528
-
529
-
```csharp
530
-
var config = new DatadogConfiguration(url: "tcp-intake.logs.datadoghq.eu", port: 443, useSSL: true, useTCP: true);
531
-
using (var log = new LoggerConfiguration()
532
-
.WriteTo.DatadogLogs(
533
-
"<API_KEY>",
534
-
source: "<SOURCE_NAME>",
535
-
service: "<SERVICE_NAME>",
536
-
host: "<HOST_NAME>",
537
-
tags: new string[] {"<TAG_1>:<VALUE_1>", "<TAG_2>:<VALUE_2>"},
<divclass="alert alert-warning">TCP log collection is <strong>not supported</strong>. Datadog provides <strong>no delivery or reliability guarantees</strong> when using TCP, and log data may be lost without notice.
2
+
For reliable ingestion, use the HTTP intake endpoint, an official Datadog Agent, or forwarder integration instead. For more information, see <ahref="/logs/log_collection/?tab=host">Log Collection</a>.</div>
0 commit comments