OneAgent is a powerful tool for automatically discovering and ingesting log data from a wide array of technologies. Built for enterprise-scale operation, it supports multiple configuration options and allows for centralized orchestration of multiple instances with detailed configuration options.
Check out the OneAgent platform and capability support matrix and deploy OneAgent to your environment.
OneAgent automatically detects log files, ensuring that relevant logs are collected and analyzed for all monitored processes. OneAgent scans the file system and applications running on the host to detect log files and sources and identifies log files. Access the Log content autodiscovery page to learn about the autodiscovery process.
Once log sources are detected, OneAgent applies relevant log ingestion rules. These rules define how the logs should be collected, parsed, and forwarded to the Dynatrace monitoring platform. The autodetection includes log rotation patterns.
OneAgent autodetects logs from hosts, and collects logs from Kubernetes container orchestration systems and from Docker containers.
Many applications generate logs in formats or locations not covered by the default autodiscovery mechanism. You can add custom log sources when automatic detection does not recognize specific log files or when you need to monitor logs from applications not covered by default settings. Configure custom log sources if you encounter challenges with the rotation pattern or when the log file does not meet the detector's requirements. To learn more, see Custom log source.
The only required step after OneAgent installation is to review default ingest rules or create custom log ingest rules to ensure the logs are ingested to the Dynatrace tenant. For further configurations, you can use the options listed in the diagram below:
required
Setting up the log ingest rules is the most important step in the configuration process. The rules allow you to specify which automatically discovered and custom logs are ingested, filtered, and stored. The log ingest rules allow customization according to specified matchers, such as process group or log source file. This ensures that the logs ingested from various sources are properly managed and integrated into the Dynatrace log monitoring system. (includes automatically discovered and custom logs).
You can review log sources detected by OneAgent on the Host or Process page in Dynatrace. For new tenants, some built-in rules are enabled by default. Learn more by accessing the Log ingest rules page.
The log ingest rules apply exclusively to OneAgent. These rules do not extend to other log collection mechanisms.
You can set up OneAgent to mask any information that you consider to be sensitive so it doesn't reach Dynatrace in plain text. To learn about this configuration, see Sensitive data masking in OneAgent.
Learn how OneAgent supports timestamps, or you can optionally configure a custom timestamp pattern specific to your case.
Dynatrace Log Monitoring uses the OneAgent log module enabled by default with all OneAgent installations. While Log Monitoring does not require any specific configuration, you can modify some of the options available for the OneAgent log module.
Setting
Default
Detect open log files
enabled
Detect system logs
enabled
Detect logs of containerized applications
enabled
Detect IIS logs
enabled
Detect logs on network file systems
disabled
Allow OneAgent to monitor Dynatrace logs
disabled
Detect container time zones
enabled
Default timezone for agents
Local time zone
Timestamp search limit
64
bytes
Severity search chars limit
100
bytes
Severity search lines limit
2
Maximum of log group instances per entity limit - count
200
Windows Event Log query timeout
5
seconds
Minimal log file size to perform binary detection
512
bytes
As an out of the box feature, OneAgent automatically decorates logs by adding topology context, maintaining trace information, and identifying severity levels. To learn more, see Automatic log enrichment.
You can use the following alternatives to OneAgent for monitoring your log data:
Visit Dynatrace Community for troubleshooting guides.