For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/cloudprem/configure/lambda.md.
A documentation index is available at /llms.txt.
Lambda search offloading is an experimental feature.
Lambda search offloading is only available on AWS.
Overview
BYOC Logs can offload leaf search operations to AWS Lambda for horizontal scaling. When the local search queue becomes saturated, overflow splits are automatically sent to Lambda functions for processing.
This allows BYOC Logs to handle traffic spikes without provisioning additional searcher nodes.
Startup validation
When a Lambda configuration is defined, BYOC Logs performs a dry run invocation at startup to verify that:
The Lambda function exists
The function version matches the running BYOC Logs binary
The invoker has permission to call the function
Prerequisite: IAM permissions
Lambda search offloading requires specific permissions for two separate IAM roles:
The BYOC Logs node role: the role attached to the Kubernetes nodes (or pod identity) running BYOC Logs. The role is defined in the serviceAccount section of your values.yaml. This role needs permissions to invoke and deploy the Lambda function.
The Lambda execution role: the role assumed by the Lambda function itself at runtime. This role needs read access to your index data in S3. Its ARN must be set in the config.searcher.lambda.auto_deploy.execution_role_arn key. For more details, see the Configuration section.
BYOC Logs node permissions
The IAM role running BYOC Logs needs the following permissions to invoke and deploy the Lambda function: