Central log management
Fully manage the lifecycle and configuration of your Kubernetes log collection within the Dynatrace platform. You don't need to manage the configuration of a log shipper across all your clusters; rather, Dynatrace allows you to do this in one platform.
- Centrally manage and control data collection, masking, dropping, transformation, and retention rather than manage distributed configurations at the source.
- Dynamically define retention periods and compliance settings to get more flexibility and resolve issues easily.
Kubernetes troubleshooting and remediation
Logs are critical to understanding and maintaining system health and performance. Dynatrace helps you quickly troubleshoot and easily remediate in a variety of ways, allowing you to:
-
Inspect and understand logs from crashing application containers and surrounding workload logs using the Dynatrace Kubernetes app.
-
Slice and dice log data with traces and Kubernetes topology with DQL.
-
Drive evidence-based investigations for security issues and forensics.
-
Easily derive metrics and events from logs for dashboarding and prediction use cases.
-
Automate remediations with log data using Dynatrace Workflows.
-
Dive into your log data; explore logs and patterns using the Dynatrace Logs app.
Cost management and allocation
Dynatrace allows you to manage costs by controlling the amount of ingested logs, the retention period for which logs are kept for analysis, and query timeframes for your analytics. You can also manage ingestion and retention by filtering log sources, managing buckets, and picking the right license model for your needs.
Additionally, you can leverage existing labels or annotations to enrich log data with cost-allocation metadata, making it easier to allocate expenses accurately. This allows for precise cross-charging, helping ensure that bills are charged to the correct departments.
Log enrichment
In addition to cost-allocation use cases, you can enrich logs with security context and other common Kubernetes context metadata. This allows you to define IAM rules to control access to log data so that only users with specific roles or permissions can query certain logs, helping your organization maintain the highest levels of privacy and security.
Further, if you also monitor your applications with Dynatrace, your log lines will be enriched with span and trace IDs for context-rich analytics of log, trace, and metrics data.