|Unlimited Data Sources|
|Notifications to email, Slack, etc|
|Permalinks to Query Results|
|Agents, SDKs, Connectors (Ruby, Python, Go, Java, MySQL, Nginx, MongoDB and more)|
|BAAs if/as requested|
|Dedicated Storage Nodes||Contact us|
|Secure Tenancy for PII/PHI Data||Contact us||Contact us||Contact us|
|Role-Based Access Controls||TBA||TBA|
*M-F 9AM-6PM PT
|48 hr response time||24 hr response time||2 hr response time|
*M-F 9AM-6PM PT
Are plans monthly or annual?
Plans can be monthly or annual. The prices above assume an annual plan and have a built in discount of 20% over month-to-month plans.
Do you meter anything besides storage?
There are soft limits on the number of events per second you can submit to Honeycomb. We’ve set this high enough (in the many thousands) so that almost no one ever encounters it. But if you do or think you will, we’re happy to create a custom plan for you with higher limits!
Do you invoice?
What kind of payments do you accept?
ACH, checks, and credit cards.
How do I know what plan is right for me?
Our free trial is meant to help you discover the kinds of events and the sample rates that fit your specific use cases. You can also contact us at any point, and we can help recommend a growth plan tailored to your needs.
How long are my events retained?
You have total control over this.
Example 1: if you have a Basic plan and generate events that are 1KB in size at the rate of 50 events/sec then you’ll get 5 GB / 50 KB = 100,000 seconds = ~27.8 hours = just over one full day of retention.
Example 2: do the same as above at a sample rate of 5:1 (so only 1 of every 5 events is sent to Honeycomb) and you increase your retention to just over 5.5 days!
Can we have a custom plan with different events/sec and storage limits?
Is there a separate charge for Honeycomb Tracing?
No, Tracing comes with every Honeycomb plan.
Traces work just like any events sent to Honeycomb: the content of the spans and any associated metadata determine how much storage is used by Honeycomb.
Honeycomb Secure Tenancy offers two options to address your security/compliance requirements while delivering access to the fine-grained observability that you need. Both options make use of a Honeycomb Secure Proxy running in your infrastructure. No plaintext data ever traverses Honeycomb’s infrastructure and the Honeycomb UI presents complete transparency to authorized members of your team. You have complete control of key rotation and reissuance down to the columnar level from within your own infrastructure.
- With Event Encryption, your datasets are encrypted and the keys are stored in a database on the Secure Proxy running in your infrastructure. When an authorized user accesses Honeycomb, their web browser connects to the Secure Proxy directly and the data is unencrypted for them. Honeycomb infrastructure never has access to the sensitive data in plaintext.
- With Event Hashing, your datasets are hashed and the hash mappings are stored in a database on the Secure Proxy running in your infrastructure. When an authorized user accesses Honeycomb, their browser sends the hashed data to the Secure Proxy running in your environment and receives the un-hashed data back. Again, no plaintext data reaches the Honeycomb infrastructure.
Do you sign BAAs?