Log onboarding flow in Dynatrace Platform

  • 3min
  • Published Mar 05, 2025

The Dynatrace log onboarding wizard simplifies the process of setting up log ingestion for various environments, including OneAgent, Kubernetes, and cloud-based log sources or forwarders. The wizard adapts to your specific setup, providing a clear and efficient path to log analytics and observability.

For deployments using OneAgent or instrumenting Kubernetes, logs are automatically detected. Built-in ingestion rules and sensitive data masking applied out of the box require no manual configuration. The configuration capabilities are offered centrally within the Dynatrace platform.

For Cloud log ingestion scenarios, Syslog, log shipper-based setups, or platform integrations, the wizard provides step-by-step guidance, including API key creation. It also offers contextual recommendations, detailed configuration instructions, and links to relevant documentation, all within a unified interface.

The onboarding process concludes with a verification step to ensure that log ingestion is fully operational and correctly configured.

Permissions

The following permissions are needed to access the Log onboarding component:

  • storage:logs:read
  • hub:catalog:read
  • environment-api:api-tokens:write

Access points to start the log onboarding process

There are several paths you can choose to start your log onboarding flow:

From the Logs App

The Logs app is the easiest way to start the log onboarding process, as it does not require finding a resource with no logs. If you are already ingesting logs and want to add additional sources, such as Syslog or platform logs, the Logs app provides an easy approach, without the need to search for specific resources.

  1. Go to the Logs app, and select Add logs in the top right corner.

From the Clouds application

  1. Go to the Clouds application > All services.
  2. Select a service record to view the details, and select Logs. This section must have no log records.
  3. Select Add logs in the empty section.

From Settings

  1. Go to Settings > Log Monitoring > Set up log ingest.

From the Hub

  1. Go to Hub and search for any technology that you want to use to ingest your logs, such as Clouds, Amazon S3 log forwarder, Kubernetes, etc.
  2. Select the technology result, and select Set up to configure log ingestion for this technology.

From Discovery & Coverage

  1. Go to Discovery & Coverage > Discovery findings.
  2. View the status list, and select the Set up log ingestion action in a record.

The Set up log ingestion button is displayed when there are no logs for a given Account ID (AWS), an Azure Subscription ID (Azure), or a Google Cloud Project (GCP).

Use case - Set up a custom log ingest from Azure

  1. Go to the Clouds application > All services.

  2. Select Azure in the Cloud section in search field

  3. Select a service record to view the details, and select Logs. This section must have no log records.

  4. Select Add logs in the empty section to open the Set up log ingest modal.

    setup-log-ingestion

  5. Choose the Azure logs option in the Choose log integration section, and select Next.

  6. In the Create token section, you have two options:

    • Generate a new token: Select Generate, copy the token key, and follow the steps in section B Add token to Logs via Azure.

      setup-log-ingestion-token

    • Use an existing token: Select Use existing token, and follow the steps in section B Add token to Logs via Azure.

  7. Select Next, and verify the correct ingestion of your logs, as per your configuration.

    setup-log-ingestion-verify

  8. Close the modal, and check the Logs sections in the service record to view your logs.