How it works
Edge runs as a DaemonSet on each node. The Datadog Agent sends logs through Edge instead of directly to Datadog. Edge applies policies and forwards to Datadog. Edge only proxies telemetry (logs, metrics, traces). Other agent traffic (security monitoring, remote config, fleet management) goes directly to Datadog.Prerequisites
- Datadog Agent running on Kubernetes (via Helm or Datadog Operator)
kubectlaccess to your cluster- Tero account
Connect
Create an Edge API key
Open your terminal and run:Navigate to Edge → API Keys → Create. Name your key (e.g., “Production cluster”). Copy the key when shown—it’s only displayed once.
Create the Edge ConfigMap
Create a ConfigMap with your Edge configuration. Select your Datadog region:
- US1
- US3
- US5
- EU
- AP1
tero-edge-config.yaml
Using a file provider instead?
Using a file provider instead?
If you prefer to manage policies locally instead of syncing from Tero, use a file provider. Add Update
policies.json to your ConfigMap:tero-edge-config.yaml
upstream_url and metrics_url for your Datadog region.Configure the Datadog Agent
Point the Datadog Agent’s log output to Edge running on the same node.The
- Datadog Operator
- Helm
Add to your
DatadogAgent CR:HOST_IP variable ensures the agent sends to the Edge instance on the same node via the hostPort.Policy providers
Edge supports multiple policy sources. Configure them in thepolicy_providers
array in your ConfigMap.
File provider
Load policies from a local file. Good for static policies bundled in the ConfigMap.HTTP provider
Fetch policies from a remote endpoint. Good for dynamic policies managed via the Tero API.${TERO_API_KEY} variable is injected from the Kubernetes secret via the
DaemonSet environment configuration.
Example policies
Add policies to thepolicies.json section of your ConfigMap:
Troubleshooting
Agent can’t reach Edge Verify Edge is listening on the hostPort:upstream_url matches your Datadog region. Check Edge logs for upstream
connection errors.