All posts

What Datadog Eclipse Actually Does and When to Use It

The alert pings. Dashboards flash. Everyone scrambles to find which service hiccuped this time. Datadog Eclipse steps into that chaos, not to add another panel, but to make sense of it all. It gives teams one secure view into their infrastructure and application performance, designed for speed and clarity when production feels on fire. Datadog has long been the go-to for metrics, logs, traces, and uptime checks. Eclipse builds on that by simplifying how data flows across environments and identi

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

The alert pings. Dashboards flash. Everyone scrambles to find which service hiccuped this time. Datadog Eclipse steps into that chaos, not to add another panel, but to make sense of it all. It gives teams one secure view into their infrastructure and application performance, designed for speed and clarity when production feels on fire.

Datadog has long been the go-to for metrics, logs, traces, and uptime checks. Eclipse builds on that by simplifying how data flows across environments and identity domains. It links observability with policy-driven access, so engineers see what they need without overexposure. Think of it as a disciplined traffic cop for your monitoring data.

At its core, Datadog Eclipse organizes telemetry streams and permissions around identity. That means requests hitting your APIs, containers, or cloud functions carry the same context your identity provider issues. Using standards like OIDC and SAML, Eclipse aligns user sessions with log events, metrics tags, and trace spans. The outcome is accountability that travels with every request.

When integrated into your workflow, Eclipse sits quietly between your apps, your identity layer, and Datadog’s collector agents. It checks roles, evaluates policies, and annotates data with verified identity claims. The logic is simple: capture everything, trust only verified data, and display it through Datadog with proper access controls. Security teams love that. So do auditors.

For smoother onboarding, map each Datadog role directly to your SSO groups. Use AWS IAM or Okta as the source of truth and rotate API keys on a schedule. Keep an eye on rate limits, since high-cardinality tags can sneak up during early configurations.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Key benefits of using Datadog Eclipse

  • Clear, identity-aware observability across teams and environments
  • Reduced manual credential handling and fewer API key sprawl incidents
  • Consistent audit trails aligned with SOC 2 and internal compliance rules
  • Faster root cause analysis through trace-level attribution
  • Simpler SSO-based access management for monitoring and alerting tools

For developers, it means shorter waits and better context. No more chasing down which cluster token expired or who has dashboard access. Logs tie back to real users, and notifications come from data that already knows who triggered what. Developer velocity rises quietly, like good automation should.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of rewriting configuration files, onboarding scripts, or token mappers, hoop.dev handles identity enforcement at the proxy layer so your Datadog Eclipse setup just works every time.

How do I connect Datadog Eclipse to my identity provider?

Point Eclipse to your IdP’s OIDC endpoint, import client credentials, and map user claims to Datadog roles. Within minutes, dashboards honor identity-based policies instead of generic keys. The process is straightforward once metadata and scopes align across both systems.

In short, Datadog Eclipse transforms monitoring into something safer, faster, and more accountable. When observability data finally knows who you are, debugging stops feeling like detective work and starts looking like engineering again.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts