Datadog Fundamentals
Logs Like A Pro
Beyond 3 Pillars
Security Suite
Cloud & Modern Ops
100

In Datadog, this is the primary way to slice and filter telemetry with key:value pairs (like service:checkout)

Tags

100

The Datadog log concept that lets you keep only a portion of logs while still retaining visibility

Logging Without Limits

100

Users are reporting that the 'Check Out' button is broken on mobile, but our backend metrics look green.

What is Real User Monitoring (RUM)?

100

We need to know if an S3 bucket was accidentally made 'public' in our AWS account.

What is Cloud Security Management (CSM)

100

The lightweight process that runs on your servers to collect and send data to Datadog

Datadog Agent

200

The Datadog feature that lets you graph metrics over time and combine queries into a single view.

Dashboards

200

In Datadog, this turns log events into time-series counts you can alert on (e.g., 5xx errors per minute).

Log-based Metrics

200

"We want to simulate a user login flow every 5 minutes from Paris, Tokyo, and New York."

What is Synthetics Browser Tests

200

I need a way to detect and look for specific patterns like 'Password123' or Credit Card numbers in our logs and other telemetry

What is Sensitive Data Scanner

200

We are moving to Google Cloud Run Functions and Azure App Services and need to monitor functions that only live for 2 seconds

What is Serverless Monitoring?

300

The Datadog feature that turns raw events into actionable notifications with thresholds, schedules, and routing

What is a monitor?

300

This Datadog Logs feature helps group similar log lines and highlights emerging errors in a click of a button.

Log Patterns

300

This feature allows us to see the exact line of code causing a bottleneck in a Java or Python application.

What is Continuous Profiler?

300

We need to automatically identify which of our production services are using open-source libraries with known critical vulnerabilities (CVEs).

What is Code Security - Software Composition Analysis (SCA)

300

The feature that provides a 'bird's eye view' of all your containers, colored by health or resource usage

What is a Container Map?

400

The practice of keeping cardinality under control by avoiding high-uniqueness values (like user IDs)

High Cardinality

400

The Datadog mechanism that ties logs to traces so you can jump from a slow request span directly to relevant log lines.

Log-Trace Correlation

400

The Datadog capability that automatically surfaces the 'root cause' (e.g., a specific deployment or database query) during an issue

What is Watchdog AI

400

This feature monitors at the kernel level to detect if a suspicious process like a crypto-miner or an unauthorized shell is executed on a production host.

What is Workload Protection
400

This tool identifies 'orphaned' cloud resources (like unattached EBS volumes) to help save money.

What is Cloud Cost Management?

500

Datadog’s mechanism for keeping related telemetry together by automatically attaching metadata such as: service, env, and version.

Unified Service Tagging

500

Which two mechanisms allow you to achieve Log-Trace correlation?

Trace ID + Span ID

500

We need to ensure our third-party APIs (like Stripe or Twilio) are responding within 200ms."

What is Synthetics API Tests

500

Detecting a SQL injection attempt or a Cross-Site Scripting (XSS) attack in real-time.

What is App & API Protection (AAP)

500

The specialized Datadog Agent used specifically to reduce API calls in a Kubernetes environment

The Cluster Agent

M
e
n
u