Blog Post

Apps on Azure Blog
14 MIN READ

Get started with Datadog MCP server in Azure SRE Agent

dbandaru's avatar
dbandaru
Icon for Microsoft rankMicrosoft
Feb 25, 2026

Connect Azure SRE Agent to Datadog's observability platform using the official Datadog MCP server for logs, metrics, traces, incidents, and more.

Overview

The Datadog MCP server is a cloud-hosted bridge between your Datadog organization and Azure SRE Agent. Once configured, it enables real-time interaction with logs, metrics, APM traces, monitors, incidents, dashboards, and other Datadog data through natural language. All actions respect your existing Datadog RBAC permissions.

The server uses Streamable HTTP transport with two custom headers (DD_API_KEY and DD_APPLICATION_KEY) for authentication. Azure SRE Agent connects directly to the Datadog-hosted endpoint—no npm packages, local proxies, or container deployments are required. The SRE Agent portal includes a dedicated Datadog MCP server connector type that pre-populates the required header keys for streamlined setup.

Key capabilities

AreaCapabilities
LogsSearch and analyze logs with SQL-based queries, filter by facets and time ranges
MetricsQuery metric values, explore available metrics, get metric metadata and tags
APMSearch spans, fetch complete traces, analyze trace performance, compare traces
MonitorsSearch monitors, validate configurations, inspect monitor groups and templates
IncidentsSearch and get incident details, view timeline and responders
DashboardsSearch and list dashboards by name or tag
HostsSearch hosts by name, tags, or status
ServicesList services and map service dependencies
EventsSearch events including monitor alerts, deployments, and custom events
NotebooksSearch and retrieve notebooks for investigation documentation
RUMSearch Real User Monitoring events for frontend observability

[!NOTE] This is the official Datadog-hosted MCP server (Preview). The server exposes 16+ core tools with additional toolsets available for alerting, APM, Database Monitoring, Error Tracking, feature flags, LLM Observability, networking, security, software delivery, and Synthetic tests. Tool availability depends on your Datadog plan and RBAC permissions.


Prerequisites

  • Azure SRE Agent resource deployed in Azure
  • Datadog organization with an active plan
  • Datadog user account with appropriate RBAC permissions
  • API key: Created from Organization Settings > API Keys
  • Application key: Created from Organization Settings > Application Keys with MCP Read and/or MCP Write permissions
  • Your organization must be allowlisted for the Datadog MCP server Preview

Step 1: Create API and Application keys

The Datadog MCP server requires two credentials: an API key (identifies your organization) and an Application key (authenticates the user and defines permission scope). Both are created in the Datadog portal.

Create an API key

  1. Log in to your Datadog organization (use your region-specific URL if applicable—e.g., app.datadoghq.eu for EU1)
  2. Select your account avatar in the bottom-left corner of the navigation bar
  3. Select Organization Settings
  4. In the left sidebar, select API Keys (under the Access section)
  5. Direct URL: https://app.datadoghq.com/organization-settings/api-keys
  6. Select + New Key in the top-right corner
  7. Enter a descriptive name (e.g., sre-agent-mcp)
  8. Select Create Key
  9. Copy the key value immediately—it is shown only once. If lost, you must create a new key.

[!TIP] API keys are organization-level credentials. Any Datadog Admin or user with the API Keys Write permission can create them. The API key alone does not grant data access—it must be paired with an Application key.

Create an Application key

  1. From the same Organization Settings page, select Application Keys in the left sidebar
  2. Direct URL: https://app.datadoghq.com/organization-settings/application-keys
  3. Select + New Key in the top-right corner
  4. Enter a descriptive name (e.g., sre-agent-mcp-app)
  5. Select Create Key
  6. Copy the key value immediately—it is shown only once

Add MCP permissions to the Application key

After creating the Application key, you must grant it the MCP-specific scopes:

  1. In the Application Keys list, locate the key you just created
  2. Select the key name to open its detail panel
  3. In the detail panel, find the Scopes section and select Edit
  4. Search for MCP in the scopes search box
  5. Check MCP Read to enable read access to Datadog data via MCP tools
  6. Optionally check MCP Write if your agent needs to create or modify resources (e.g., feature flags, Synthetic tests)
  7. Select Save

[!NOTE] If you don't see the MCP Read or MCP Write scopes, your organization may not be enrolled in the Datadog MCP server preview. Contact your Datadog account representative to request access.

Required permissions summary

PermissionDescriptionRequired?
MCP ReadRead access to Datadog data via MCP tools (logs, metrics, traces, monitors, etc.)Yes
MCP WriteWrite access for mutating operations (creating feature flags, editing Synthetic tests, etc.)Optional

[!IMPORTANT] For production use, create keys from a service account rather than a personal account. Navigate to Organization Settings > Service Accounts to create one. This ensures the integration continues to work if team members leave the organization. Apply the principle of least privilege—grant only MCP Read unless write operations are needed.

[!TIP] Use scoped Application keys to restrict access to only the permissions your agent needs. This limits blast radius if a key is compromised.


Step 2: Add the MCP connector

Connect the Datadog MCP server to your SRE Agent using the portal. The portal includes a dedicated Datadog connector type that pre-populates the required configuration.

Determine your regional endpoint

Select the endpoint URL that matches your Datadog organization's region:

RegionEndpoint URL
US1 (default)https://mcp.datadoghq.com/api/unstable/mcp-server/mcp
US3https://mcp.us3.datadoghq.com/api/unstable/mcp-server/mcp
US5https://mcp.us5.datadoghq.com/api/unstable/mcp-server/mcp
EU1https://mcp.datadoghq.eu/api/unstable/mcp-server/mcp
AP1https://mcp.ap1.datadoghq.com/api/unstable/mcp-server/mcp
AP2https://mcp.ap2.datadoghq.com/api/unstable/mcp-server/mcp

Using the Azure portal

  1. In Azure portal, navigate to your SRE Agent resource
  2. Select Builder > Connectors
  3. Select Add connector
  4. Select Datadog MCP server and select Next

Select "Datadog MCP server" as the connector type in the Add a connector dialog

  1. Configure the connector:
FieldValue
Namedatadog-mcp
Connection typeStreamable-HTTP (pre-selected)
URLhttps://mcp.datadoghq.com/api/unstable/mcp-server/mcp (change for non-US1 regions)
AuthenticationCustom headers (pre-selected, disabled)
DD_API_KEYYour Datadog API key
DD_APPLICATION_KEYYour Datadog Application key
  1. Select Next to review

Configure the Datadog MCP connector with the endpoint URL, DD_API_KEY, and DD_APPLICATION_KEY fields

  1. Select Add connector

[!NOTE] The Datadog connector type pre-populates both header keys (DD_API_KEY and DD_APPLICATION_KEY) and sets the authentication method to "Custom headers" automatically. The default URL is the US1 endpoint—update it if your organization is in a different region.

[!NOTE] Once the connector shows Connected status, the Datadog MCP tools are automatically available to your agent. You can verify by checking the tools list in the connector details.

Connectors list showing datadog-mcp with Connected status


Step 3: Create a Datadog subagent (optional)

Create a specialized subagent to give the AI focused Datadog observability expertise and better prompt responses.

  1. Navigate to Builder > Subagents
  2. Select Add subagent
  3. Paste the following YAML configuration:
api_version: azuresre.ai/v1
kind: AgentConfiguration
metadata:
  owner: your-team@contoso.com
  version: "1.0.0"
spec:
  name: DatadogObservabilityExpert
  display_name: Datadog Observability Expert

  system_prompt: |
    You are a Datadog observability expert with access to logs, metrics, APM
    traces, monitors, incidents, dashboards, hosts, services, and more via
    the Datadog MCP server.

    ## Capabilities

    ### Logs
    - Search logs using facets, tags, and time ranges with `search_datadog_logs`
    - Perform SQL-based log analysis with `analyze_datadog_logs` for aggregations,
      grouping, and statistical queries
    - Correlate log entries with traces and metrics

    ### Metrics
    - Query metric time series with `get_datadog_metric`
    - Get metric metadata, tags, and context with `get_datadog_metric_context`
    - Discover available metrics with `search_datadog_metrics`

    ### APM (Application Performance Monitoring)
    - Fetch complete traces with `get_datadog_trace`
    - Search distributed traces and spans with `search_datadog_spans`
    - Analyze service-level performance and latency patterns
    - Map service dependencies with `search_datadog_service_dependencies`

    ### Monitors & Alerting
    - Search monitors by name, tag, or status with `search_datadog_monitors`
    - Investigate triggered monitors and alert history
    - Correlate monitor alerts with underlying metrics and logs

    ### Incidents
    - Search incidents with `search_datadog_incidents`
    - Get incident details, timeline, and responders with `get_datadog_incident`
    - Correlate incidents with monitors, logs, and traces

    ### Infrastructure
    - Search hosts by name, tag, or status with `search_datadog_hosts`
    - List and discover services with `search_datadog_services`
    - Search dashboards with `search_datadog_dashboards`
    - Search events (monitor alerts, deployments) with `search_datadog_events`

    ### Notebooks
    - Search notebooks with `search_datadog_notebooks`
    - Retrieve notebook content with `get_datadog_notebook`

    ### Real User Monitoring
    - Search RUM events for frontend performance data with `search_datadog_rum_events`

    ## Best Practices

    When investigating incidents:
    - Start with `search_datadog_incidents` or `get_datadog_incident` for context
    - Check related monitors with `search_datadog_monitors`
    - Correlate with `search_datadog_logs` and `get_datadog_metric` for root cause
    - Use `get_datadog_trace` to inspect request flows for latency issues
    - Check `search_datadog_hosts` for infrastructure-level problems

    When analyzing logs:
    - Use `analyze_datadog_logs` for SQL-based aggregation queries
    - Use `search_datadog_logs` for individual log retrieval and filtering
    - Include time ranges to narrow results and reduce response size
    - Filter by service, host, or status to focus on relevant data

    When working with metrics:
    - Use `search_datadog_metrics` to discover available metric names
    - Use `get_datadog_metric_context` to understand metric tags and metadata
    - Use `get_datadog_metric` to query actual metric values with time ranges

    When handling errors:
    - If access is denied, explain which RBAC permission is needed
    - Suggest the user verify their Application key has `MCP Read` or `MCP Write`
    - For large traces that appear truncated, note this is a known limitation

  mcp_connectors:
    - datadog-mcp

  handoffs: []
  1. Select Save

[!NOTE] The mcp_connectors field references the connector name you created in Step 2. This gives the subagent access to all tools provided by the Datadog MCP server.


Step 4: Add a Datadog skill (optional)

Skills provide contextual knowledge and best practices that help agents use tools more effectively. Create a Datadog skill to give your agent expertise in log queries, metric analysis, and incident investigation workflows.

  1. Navigate to Builder > Skills
  2. Select Add skill
  3. Paste the following skill configuration:
api_version: azuresre.ai/v1
kind: SkillConfiguration
metadata:
  owner: your-team@contoso.com
  version: "1.0.0"
spec:
  name: datadog_observability
  display_name: Datadog Observability

  description: |
    Expertise in Datadog's observability platform including logs, metrics, APM,
    monitors, incidents, dashboards, hosts, and services. Use for searching logs,
    querying metrics, investigating incidents, analyzing traces, inspecting
    monitors, and navigating Datadog data via the Datadog MCP server.

  instructions: |
    ## Overview

    Datadog is a cloud-scale observability platform for logs, metrics, APM traces,
    monitors, incidents, infrastructure, and more. The Datadog MCP server enables
    natural language interaction with your organization's Datadog data.

    **Authentication:** Two custom headers—`DD_API_KEY` (API key) and
    `DD_APPLICATION_KEY` (Application key with MCP permissions). All actions
    respect existing RBAC permissions.

    **Regional endpoints:** The MCP server URL varies by Datadog region (US1,
    US3, US5, EU1, AP1, AP2). Ensure the connector URL matches your organization's
    region.

    ## Searching Logs

    Use `search_datadog_logs` for individual log retrieval and `analyze_datadog_logs`
    for SQL-based aggregation queries.

    **Common log search patterns:**

    ```
    # Errors from a specific service
    service:payment-api status:error

    # Logs from a host in the last hour
    host:web-prod-01

    # Logs containing a specific trace ID
    trace_id:abc123def456

    # Errors with a specific HTTP status
    @http.status_code:500 service:api-gateway

    # Logs from a Kubernetes pod
    kube_namespace:production kube_deployment:checkout-service
    ```

    **SQL-based log analysis with `analyze_datadog_logs`:**

    ```sql
    -- Count errors by service in the last hour
    SELECT service, count(*) as error_count
    FROM logs
    WHERE status = 'error'
    GROUP BY service
    ORDER BY error_count DESC

    -- Average response time by endpoint
    SELECT @http.url_details.path, avg(@duration) as avg_duration
    FROM logs
    WHERE service = 'api-gateway'
    GROUP BY @http.url_details.path
    ```

    ## Querying Metrics

    Use `search_datadog_metrics` to discover metrics, `get_datadog_metric_context`
    for metadata, and `get_datadog_metric` for time series data.

    **Common metric patterns:**

    ```
    # System metrics
    system.cpu.user, system.mem.used, system.disk.used

    # Container metrics
    docker.cpu.usage, kubernetes.cpu.requests

    # Application metrics
    trace.servlet.request.hits, trace.servlet.request.duration

    # Custom metrics
    app.payment.processed, app.queue.depth
    ```

    Always specify a time range when querying metrics to avoid retrieving
    excessive data.

    ## Investigating Traces

    Use `get_datadog_trace` for complete trace details and `search_datadog_spans`
    for span-level queries.

    **Trace investigation workflow:**
    1. Search for slow or errored spans with `search_datadog_spans`
    2. Get the full trace with `get_datadog_trace` using the trace ID
    3. Identify the bottleneck service or operation
    4. Correlate with `search_datadog_logs` using the trace ID
    5. Check related metrics with `get_datadog_metric`

    ## Working with Monitors

    Use `search_datadog_monitors` to find monitors by name, tag, or status.

    **Common monitor queries:**

    ```
    # Find all triggered monitors
    Search for monitors with status "Alert"

    # Find monitors for a specific service
    Search for monitors tagged with service:payment-api

    # Find monitors by name
    Search for monitors matching "CPU" or "memory"
    ```

    ## Incident Investigation Workflow

    For structured incident investigation:
    1. `search_datadog_incidents` — find recent or active incidents
    2. `get_datadog_incident` — get full incident details and timeline
    3. `search_datadog_monitors` — check which monitors triggered
    4. `search_datadog_logs` — search for errors around the incident time
    5. `get_datadog_metric` — check key metrics for anomalies
    6. `get_datadog_trace` — inspect request traces for latency or errors
    7. `search_datadog_hosts` — verify infrastructure health
    8. `search_datadog_service_dependencies` — map affected services

    ## Working with Dashboards and Notebooks

    - Use `search_datadog_dashboards` to find dashboards by title or tag
    - Use `search_datadog_notebooks` and `get_datadog_notebook` for investigation
      notebooks that document past analyses

    ## Toolsets

    The Datadog MCP server supports toolsets via the `?toolsets=` query parameter
    on the endpoint URL. Available toolsets:

    | Toolset | Description |
    |---------|-------------|
    | `core` | Logs, metrics, traces, dashboards, monitors, incidents, hosts, services, events, notebooks (default) |
    | `alerting` | Monitor validation, groups, and templates |
    | `apm` | Trace analysis, span search, Watchdog insights, performance investigation |
    | `dbm` | Database Monitoring query plans and samples |
    | `error-tracking` | Error Tracking issues across RUM, Logs, and Traces |
    | `feature-flags` | Creating, listing, and updating feature flags |
    | `llmobs` | LLM Observability spans |
    | `networks` | Cloud Network Monitoring, Network Device Monitoring |
    | `onboarding` | Guided Datadog setup and configuration |
    | `security` | Code security scanning, security signals, findings |
    | `software-delivery` | CI Visibility, Test Optimization |
    | `synthetics` | Synthetic test management |

    To enable additional toolsets, append `?toolsets=core,apm,alerting` to the
    connector URL.

    ## Troubleshooting

    | Issue | Solution |
    |-------|----------|
    | 401/403 errors | Verify API key and Application key are correct and active |
    | No data returned | Check that Application key has `MCP Read` permission |
    | Wrong region | Ensure the connector URL matches your Datadog organization's region |
    | Truncated traces | Large traces may be truncated; this is a known limitation |
    | Tool not found | The tool may require a non-default toolset; update the connector URL |
    | Write operations fail | Verify Application key has `MCP Write` permission |

  mcp_connectors:
    - datadog-mcp
  1. Select Save

Reference the skill in your subagent

Update your subagent configuration to include the skill:

spec:
  name: DatadogObservabilityExpert
  skills:
    - datadog_observability
  mcp_connectors:
    - datadog-mcp

Step 5: Test the integration

  1. Open a new chat session with your SRE Agent
  2. Try these example prompts:

Log analysis

Search for error logs from the payment-api service in the last hour

Analyze logs to count errors by service over the last 24 hours

Find all logs with HTTP 500 status from the api-gateway in the last 30 minutes

Show me the most recent logs from host web-prod-01

Metrics investigation

What is the current CPU usage across all production hosts?

Show me the request rate and error rate for the checkout-service over the last 4 hours

What metrics are available for the payment-api service?

Get the p99 latency for the api-gateway service in the last hour

APM and trace analysis

Find the slowest traces for the checkout-service in the last hour

Get the full trace details for trace ID abc123def456

What services depend on the payment-api?

Search for errored spans in the api-gateway service from the last 30 minutes

Monitor and alerting workflows

Show me all monitors currently in Alert status

Find monitors related to the database-primary host

What monitors are tagged with team:platform?

Search for monitors matching "disk space" or "memory"

Incident investigation

Show me all active incidents from the last 24 hours

Get details for incident INC-12345 including the timeline

What monitors triggered during the last production incident?

Correlate the most recent incident with related logs and metrics

Infrastructure and dashboards

Search for hosts tagged with env:production and team:platform

List all dashboards related to "Kubernetes" or "EKS"

What services are running in the production environment?

Show me recent deployment events for the checkout-service

Available tools

Core toolset (default)

The core toolset is included by default and provides essential observability tools.

ToolDescription
search_datadog_logsSearch logs by facets, tags, and time ranges
analyze_datadog_logsSQL-based log analysis for aggregations and statistical queries
get_datadog_metricQuery metric time series with rollup and aggregation
get_datadog_metric_contextGet metric metadata, tags, and related context
search_datadog_metricsList and discover available metrics
get_datadog_traceFetch a complete distributed trace by trace ID
search_datadog_spansSearch APM spans by service, operation, or tags
search_datadog_monitorsSearch monitors by name, tag, or status
get_datadog_incidentGet incident details including timeline and responders
search_datadog_incidentsList and search incidents
search_datadog_dashboardsSearch dashboards by title or tag
search_datadog_hostsSearch hosts by name, tag, or status
search_datadog_servicesList and search services
search_datadog_service_dependenciesMap service dependency relationships
search_datadog_eventsSearch events (monitor alerts, deployments, custom events)
get_datadog_notebookRetrieve notebook content by ID
search_datadog_notebooksSearch notebooks by title or tag
search_datadog_rum_eventsSearch Real User Monitoring events

Alerting toolset

Enable with ?toolsets=core,alerting on the connector URL.

ToolDescription
validate_datadog_monitorValidate monitor configuration before creation
get_datadog_monitor_templatesGet monitor configuration templates
search_datadog_monitor_groupsSearch monitor groups and their statuses

APM toolset

Enable with ?toolsets=core,apm on the connector URL.

ToolDescription
apm_search_spansAdvanced span search with APM-specific filters
apm_explore_traceInteractive trace exploration and analysis
apm_trace_summaryGet a summary analysis of a trace
apm_trace_comparisonCompare two traces side by side
apm_analyze_trace_metricsAnalyze aggregated trace metrics and trends

Database Monitoring toolset

Enable with ?toolsets=core,dbm on the connector URL.

ToolDescription
search_datadog_dbm_plansSearch database query execution plans
search_datadog_dbm_samplesSearch database query samples and statistics

Error Tracking toolset

Enable with ?toolsets=core,error-tracking on the connector URL.

ToolDescription
search_datadog_error_tracking_issuesSearch error tracking issues across RUM, Logs, and Traces
get_datadog_error_tracking_issueGet details of a specific error tracking issue

Feature Flags toolset

Enable with ?toolsets=core,feature-flags on the connector URL.

ToolDescription
list_datadog_feature_flagsList feature flags
create_datadog_feature_flagCreate a new feature flag
update_datadog_feature_flag_environmentUpdate feature flag settings for an environment

LLM Observability toolset

Enable with ?toolsets=core,llmobs on the connector URL.

ToolDescription
LLM Observability spansQuery and analyze LLM Observability span data

Networks toolset

Enable with ?toolsets=core,networks on the connector URL.

ToolDescription
Cloud Network Monitoring toolsAnalyze cloud network traffic and dependencies
Network Device Monitoring toolsMonitor and troubleshoot network devices

Security toolset

Enable with ?toolsets=core,security on the connector URL.

ToolDescription
datadog_code_security_scanRun code security scanning
datadog_sast_scanRun Static Application Security Testing
datadog_secrets_scanScan for secrets and credentials in code

Software Delivery toolset

Enable with ?toolsets=core,software-delivery on the connector URL.

ToolDescription
search_datadog_ci_pipeline_eventsSearch CI pipeline execution events
get_datadog_flaky_testsIdentify flaky tests in CI pipelines

Synthetics toolset

Enable with ?toolsets=core,synthetics on the connector URL.

ToolDescription
get_synthetics_testsList and get Synthetic test configurations
edit_synthetics_testsEdit Synthetic test settings
synthetics_test_wizardGuided wizard for creating Synthetic tests

Toolsets

The Datadog MCP server organizes tools into toolsets. By default, only the core toolset is enabled. To enable additional toolsets, append the ?toolsets= query parameter to the connector URL.

Syntax

https://mcp.datadoghq.com/api/unstable/mcp-server/mcp?toolsets=core,apm,alerting

Examples

Use caseURL suffix
Default (core only)No suffix needed
Core + APM analysis?toolsets=core,apm
Core + Alerting + APM?toolsets=core,alerting,apm
Core + Database Monitoring?toolsets=core,dbm
Core + Security scanning?toolsets=core,security
Core + CI/CD visibility?toolsets=core,software-delivery
All toolsets?toolsets=core,alerting,apm,dbm,error-tracking,feature-flags,llmobs,networks,onboarding,security,software-delivery,synthetics

[!TIP] Only enable the toolsets you need. Each additional toolset increases the number of tools exposed to the agent, which can increase token usage and may impact response quality. Start with core and add toolsets as needed.

Updating the connector URL

To add toolsets after initial setup:

  1. Navigate to Builder > Connectors
  2. Select the datadog-mcp connector
  3. Update the URL field to include the ?toolsets= parameter
  4. Select Save

Troubleshooting

Authentication issues

ErrorCauseSolution
401 UnauthorizedInvalid API key or Application keyVerify both keys are correct and active in Organization Settings
403 ForbiddenMissing RBAC permissionsEnsure the Application key has MCP Read and/or MCP Write permissions
Connection refusedWrong regional endpointVerify the connector URL matches your Datadog organization's region
"Organization not allowlisted"Preview access not grantedContact Datadog support to request MCP server Preview access

Data and permission issues

ErrorCauseSolution
No data returnedInsufficient permissions or wrong time rangeVerify Application key permissions; try a broader time range
Tool not foundTool belongs to a non-default toolsetAdd the required toolset to the ?toolsets= parameter in the connector URL
Truncated trace dataTrace exceeds size limitLarge traces are truncated for context window efficiency; query specific spans instead
Write operation failedMissing MCP Write permissionAdd MCP Write permission to the Application key
Metric not foundWrong metric name or no data in time rangeUse search_datadog_metrics to discover available metric names

Verify the connection

Test the server endpoint directly:

curl -I "https://mcp.datadoghq.com/api/unstable/mcp-server/mcp" \
  -H "DD_API_KEY: <your_api_key>" \
  -H "DD_APPLICATION_KEY: <your_application_key>"

Expected response: 200 OK confirms authentication is working.

Re-authorize the integration

If you encounter persistent issues:

  1. Navigate to Organization Settings > Application Keys in Datadog
  2. Revoke the existing Application key
  3. Create a new Application key with the required MCP Read/MCP Write permissions
  4. Update the connector in the SRE Agent portal with the new key

Limitations

LimitationDetails
Preview onlyThe Datadog MCP server is in Preview and not recommended for production use
Allowlisted organizationsOnly organizations that have been allowlisted by Datadog can access the MCP server
Large trace truncationResponses are optimized for LLM context windows; large traces may be truncated
Unstable API pathThe endpoint URL contains /unstable/ indicating the API may change without notice
Toolset availabilitySome toolsets may not be available depending on your Datadog plan and features enabled
Regional endpointsYou must use the endpoint matching your organization's region; cross-region queries are not supported

Security considerations

How permissions work

  • RBAC-scoped: All actions respect the RBAC permissions associated with the API and Application keys
  • Key-based: Access is controlled through API key (organization-level) and Application key (user or service account-level)
  • Permission granularity: MCP Read enables read operations; MCP Write enables mutating operations

Admin controls

Datadog administrators can: - Create and revoke API and Application keys in Organization Settings - Assign granular RBAC permissions (MCP Read, MCP Write) to Application keys - Use service accounts to decouple access from individual user accounts - Monitor MCP tool usage through the Datadog Audit Trail - Scope Application keys to limit the blast radius of compromised credentials

[!IMPORTANT] The Datadog MCP server can read sensitive operational data including logs, metrics, and traces. Use service accounts with scoped Application keys, grant only the permissions your agent needs, and monitor the Audit Trail for unusual activity.


Updated Feb 25, 2026
Version 3.0
No CommentsBe the first to comment