Security overview | Honeycomb

We use cookies or similar technologies to personalize your online experience & tailor marketing to you. Many of our product features require cookies to function properly.

Read our privacy policy I accept cookies from this site

Security overview

Honeycomb offers a secure service. Here’s how we do it:

How we secure your data  🔗

  • We delete data as it exceeds the 60-day retention window.
  • You can delete datasets at any time. For more fine-grained deletion (a single column, for instance) contact support.
  • Your API Keys authenticate data ingestion.
    • A team owner can create up to 5 API Keys for each team. Enable or disable keys as often as needed. Contact support for additional keys.
    • If you send data using a disabled or invalid API Key, our API server will reject your events.

How we secure our infrastructure  🔗

  • The Honeycomb network is architected using modern best practices for tunneling, separate VPCs, encryption at rest and in transit.
  • All storage nodes are unreachable from the internet.
  • Only web services (API, UI) are reachable from the internet at all, and then only through ELB TLS ports.
  • Nothing is transmitted unencrypted.
  • Our entire infrastructure is auto-scalable, which lets us roll our entire infrastructure in ~60 minutes (~10 minutes for our forward-facing web nodes) when critical security patches are released.

How we secure our agent  🔗

  • Our various agents do not run as root and cannot be controlled remotely.
  • All integrations are 100% open-source so you can examine it to your heart’s content.

Compliance data  🔗

  • For compliance data, we offer our Secure Tenancy service. Secure Tenancy ensures that your plaintext data is never present in Honeycomb’s data files, and keys are never accessible by us.
  • Fully auditable by your security team.
  • Vetted by independent security professionals.

For more information about Secure Tenancy, contact your Honeycomb Sales Representative or reach out to us via our Help Page.