Proxylity Features | Pricing | Documentation | Contact | About

You're spending too much on Datadog log ingest. Stop.

30-50% of a typical $1M Datadog bill is log ingestion and retention — commodity pipe work with no analytical value. Proxylity replaces that layer serverlessly on AWS for a fraction of the cost. Keep Datadog for APM, dashboards, and developer tooling. Pay for the pipes separately.

$25,000 per month — Datadog log ingest + retention est. 30% of $1M spend · see assumptions below
~$2,800 per month — Proxylity Enterprise + AWS same 3 TB/mo · batch pricing · billed via AWS

Schedule a Savings Review → Try free with AWS Read the docs

This is a Known Problem

603 Datadog customers at $1M+/yr
Q4 2025 earnings
30–50% of typical $1M bill:
log ingest + retention
~90% cost reduction: $25K/mo
→ ~$2,800/mo at 3 TB/month
(full-ingest architecture)

Datadog is an exceptional observability platform. That is not the argument here. The argument is that raw UDP log ingestion — syslog datagrams, SNMP traps, firewall events — does not require an enterprise APM platform behind it. That's a commodity pipe, and you are paying APM pricing for it. The ingest and retention work belongs on the infrastructure that already stores the rest of your data: AWS.

How It Works

Each site — headquarters, branch offices, data centers, cloud accounts — runs a gateway that peers with the Proxylity listener over WireGuard. Syslog traffic never traverses the internet unencrypted. Individual devices continue sending UDP to port 514 on their local gateway unchanged. No per-device reconfiguration. One WireGuard key pair per site.

Proxylity batch-delivers each message to two destinations in your AWS account: CloudWatch Logs for live querying and metric-filter alerting, and Kinesis Firehose for durable delivery to S3 Glacier. One CloudFormation stack deploys the entire pipeline — listener, KMS key, Firehose, S3 bucket with Object Lock, CloudWatch log group, and SNS alarm topic.

firewall / syslog network devices app servers UDP :514 (LAN) Site Gateway (WireGuard peer) WireGuard encrypted Proxylity UDP Listener batch batch CloudWatch Logs 7-day live query + alerting Firehose → S3 Glacier 365-day WORM archive

Both destinations are configured as Proxylity destinations referencing CloudWatch Logs and Firehose ARNs from the CloudFormation stack. All log data stays in your AWS environment — encrypted at rest with a customer-managed KMS key, protected by S3 Object Lock (GOVERNANCE mode), and transmitted only over WireGuard + TLS. No agents, no collectors, no log shippers.

Estimated Savings: ~$267,000/year

At 3 TB/month of syslog, the Proxylity Enterprise + AWS stack costs approximately $2,778/month all-in. The Datadog equivalent at the same volume is estimated at $25,000/month. That's a difference of ~$22,200/month — roughly $267,000/year — for the same ingest volume, the same archive retention, and the same live-query capability.

Assumption 1: Log ingest and retention represents ~30% of a $1M annual Datadog bill — an estimate consistent with industry analyst commentary on large observability contracts where APM and infrastructure monitoring share the remainder. Your proportion may be higher or lower. At 30%, log management costs $25,000/month.

Assumption 2: At a blended effective rate of ~$8/GB (ingest + indexing + 30-day retention, averaged across on-demand list pricing for 300-byte syslog events), $25K/month corresponds to approximately 3 TB/month of syslog volume. Negotiated enterprise rates are typically lower; your implied volume would be proportionally higher at the same spend.

3 TB/month = roughly 10 billion packets/month = ~3,860 packets/second average. At that rate, well above the 400-pps crossover, Enterprise batch pricing strictly dominates per-packet pricing. The batch calculation:

Proxylity Enterprise (batch pricing)

Plan Enterprise subscription (no per-Listener charges) $850
Batch usage 110M batches/mo · 10M @$2.50/M, next 90M @$2.25/M, next 10M @$2.00/M ~$248
Proxylity total ~$1,098/mo

AWS Infrastructure (3 TB/month)

Archive delivery Kinesis Firehose · 3,000 GB × $0.029/GB ~$87
Live query ingest CloudWatch Logs · 3,000 GB × $0.50/GB (7-day retention) ~$1,500
CW storage ~700 GB avg stored × $0.03/GB ~$21
WORM archive S3 Glacier · 365-day retention (Object Lock GOVERNANCE) ~$72
AWS total ~$1,680/mo
Full stack (Proxylity + AWS) ~$2,778/mo
Datadog equivalent (same volume) ~$25,000/mo

Note on CloudWatch Logs cost: At 3 TB/month, the dominant AWS cost is CloudWatch ingest ($0.50/GB). Proxylity destinations do not filter — all packets go to all configured destinations. If you want to reduce CloudWatch ingest, the practical approach is to add a Lambda as a second Proxylity destination that forwards only high-severity events (emerg, alert, crit) to CloudWatch Logs, while Firehose receives everything. At typical syslog severity distributions, high-severity events are under 1% of volume — reducing CloudWatch ingest from $1,500/month to $10–$15/month and bringing the total stack to approximately $1,100–$1,300/month.

Per-packet pricing (Professional plan) is available and more cost-effective at lower volumes — below roughly 400 packets/second. At the volumes a $1M Datadog customer generates, Enterprise batch pricing reduces Proxylity-side costs from well over $10,000/month (per-packet) to under $900/month. Billed through AWS Marketplace — no separate vendor invoice, no minimums, no contract.

Surgical Cost Reduction — Not a Rip-and-Replace

Your APM traces, error tracking, dashboards, SLO monitors, and developer tooling stay exactly where they are. The extraction is precise: move the commodity ingest and retention work to the infrastructure layer where it belongs, and keep Datadog doing what Datadog is excellent at.

Capability Keep in Datadog Move to Proxylity + AWS
APM / distributed tracing Yes — unchanged
Dashboards + alerting Yes — unchanged
Error tracking Yes — unchanged
Developer tooling Yes — unchanged
UDP syslog ingest (:514) Proxylity Listener
Raw log delivery + 30-day search CloudWatch Logs
Compliance archive Firehose → S3 Glacier
Long-term retention (12+ months) S3 lifecycle policies

The change your syslog sources see: a new UDP endpoint IP. That's it. Reconfiguring rsyslog or syslog-ng to point at a new destination takes minutes.

Compliance Properties

Syslog data in this architecture passes through Proxylity in transit before landing in your AWS account. Proxylity is not independently SOC 2, HIPAA, or PCI audited at this time. Your security team should evaluate Proxylity as a subprocessor alongside the storage layer when scoping compliance coverage. Proxylity participates in AWS Marketplace Vendor Insights, which provides a documented security profile — covering encryption, access control, and data handling practices — that procurement and security teams can review directly in the AWS Marketplace console or request through AWS. What the architecture does provide — and what is fully auditable — is a set of strong technical controls on both the transport and storage layers.

Control Where it applies Details
Encryption in transit Site → Proxylity → AWS WireGuard (ChaCha20-Poly1305, Curve25519) from each site gateway to the listener; TLS for Proxylity-to-CloudWatch and Proxylity-to-Firehose delivery. No plaintext traversal over the internet at any hop.
Encryption at rest S3, CloudWatch Logs Customer-managed KMS key (CMK) on all stored objects and log events; automatic key rotation (default 365 days). Keys are owned by your AWS account.
Log immutability S3 S3 Object Lock in GOVERNANCE mode prevents deletion or overwrite before the retention period expires. Switch to COMPLIANCE mode for environments under continuous audit where no principal should be able to bypass retention.
Log retention (365 days) S3 Glacier Configurable via LogArchiveExpirationInDays parameter. Lifecycle policy transitions objects to Glacier after 28 days.
Data residency AWS account + region All stored log data lands in your AWS account in the region you deploy to. Proxylity does not retain or copy log contents.
AWS service certifications Storage layer only CloudWatch Logs, Kinesis Firehose, and S3 are covered under AWS's SOC 2, PCI DSS Level 1, and HIPAA BAA programs. These certifications apply to the storage layer inside your account — not to Proxylity as an ingest service.

Five-Minute Deployment

A production-ready CloudFormation template is available in the Proxylity examples repository (syslog-cw-s3.template.json). It provisions the full stack: WireGuard listener, KMS CMK with rotation, Kinesis Firehose with S3 Object Lock bucket, CloudWatch log group, metric filters for high-severity detection, and an SNS alarm topic — all from a single deploy command.

Key parameters (all have sensible defaults):

PeerPublicKey
WireGuard public key for your first site gateway (required)
LogGroupRetentionInDays
CloudWatch Logs retention — default: 7
LogArchiveTransitionToGlacierInDays
Days before S3 transitions to Glacier — default: 28
LogArchiveExpirationInDays
S3 Object Lock retention period — default: 365
AlarmEmail
Optional SNS email for high-severity alerts and pipeline-silence alarm

Deploy:

# 1. Generate a WireGuard key pair for the first site gateway
wg genkey | tee site1.key | wg pubkey > site1.pub

# 2. Deploy the full stack (one command)
aws cloudformation deploy \
  --template-file syslog-cw-s3.template.json \
  --stack-name syslog \
  --capabilities CAPABILITY_NAMED_IAM CAPABILITY_IAM CAPABILITY_AUTO_EXPAND \
  --parameter-overrides \
      PeerPublicKey=$(cat site1.pub) \
      LogGroupRetentionInDays=7 \
      LogArchiveExpirationInDays=365 \
      AlarmEmail=ops@yourcompany.com

# 3. Retrieve the listener endpoint and public key
aws cloudformation describe-stacks --stack-name syslog \
  --query 'Stacks[0].Outputs' > outputs.json

export ENDPOINT=$(jq -r '.[]|select(.OutputKey=="Domain")|.OutputValue' outputs.json)
export PORT=$(jq -r '.[]|select(.OutputKey=="Port")|.OutputValue' outputs.json)
export LISTENER_PUBKEY=$(jq -r '.[]|select(.OutputKey=="ListenerPublicKey")|.OutputValue' outputs.json)

Configure WireGuard on the site gateway, then point syslog to the listener's tunnel IP. For rsyslog:

*.* @<listener-tunnel-ip>:514

For syslog-ng:

destination d_proxylity { udp("<listener-tunnel-ip>" port(514)); };
log { source(s_src); destination(d_proxylity); };

Additional sites each add one WireGuard peer entry to the SyslogListener resource and redeploy. Individual syslog clients on those networks require no reconfiguration — they continue sending to the local gateway on port 514.

Start reducing your Datadog bill today

Free tier included. No contract. Billed through AWS Marketplace — no new vendor to onboard. Your procurement process already handles this.

Schedule a Savings Review → Buy with AWS Explore the docs