Datadog Blog
4 FOLLOWERS
Check out The Monitor, Datadog's main blog, to learn more about new Datadog products and features, integrations, and more. Datadog is the monitoring and security platform for cloud applications.
Datadog Blog
1d ago
Microsoft Azure provides an array of managed services to support many aspects of cloud computing, including application development, workload migration, and data management. To help you monitor the health and performance of these services, Datadog offers integrations with more than 40 Azure services, including Azure Kubernetes Service (AKS), Cosmos DB, and Azure App Services. Each integration provides robust data visualizations, meaningful alerts, and one-click Datadog Agent deployment. For organizations with large collections of integrations, however, it can be challenging to assess and adjus ..read more
Datadog Blog
6d ago
In order to grow your organization effectively, you need to ensure the scalability of your systems. In a broad, distributed architecture, critical processes like incident triage, security response, and large-scale configuration changes can be difficult to execute without a programmatically accessible registry of what’s running in production and who owns it.By creating a service catalog that enriches services with ownership and configuration metadata, maps dependencies, and collates monitoring data, you can maintain a central source of knowledge about your services’ health, activity, security p ..read more
Datadog Blog
6d ago
Detecting malware in container environments can be a major challenge due to the rapid development of malicious code, the proliferation of insecure container images, and the multilayered complexity of container stacks. Staying ahead of attackers means tracking the constant evolution of malware and rooting out threats in your codebase at the expense of considerable compute.Datadog Cloud Security Management (CSM) provides a unified platform for malware detection across your containerized environment ..read more
Datadog Blog
1w ago
Kata Containers is an open source project that seeks to enhance security for containers by isolating them in lightweight VMs. Each Kata Container runs with the speed and flexibility of standard containers, and it easily integrates with common container management software—including Docker and Kubernetes. By also using hardware virtualization to isolate network, I/O, and memory, Kata Containers enjoy the same security advantages of VMs, making them a good fit for sensitive financial workloads, multi-tenanted workloads in the cloud, or any other workloads that benefit from extra security and iso ..read more
Datadog Blog
1w ago
Debugging errors in production environments can frustrate your team and disrupt your development cycle. Once error tracking detects an exception, you then need to identify which specific line of code or module is responsible for the error. Without access to the inputs and associated states that caused the errors, reproducing them to find the root cause and a solution can be a lengthy and challenging process.To help you remediate bugs and discover their root causes faster, Datadog Exception Replay automatically captures the local variable data and execution context of production errors in APM E ..read more
Datadog Blog
2w ago
Container-native technologies increase the scalability and speed of deployment offered by containerized infrastructure, but they also present new monitoring challenges for organizations that adopt them. For example, because containers are ephemeral and share resources, tracking resource provisioning in container-native tools is essential to ensure consistent application performance. Additionally, as adoption of containerized infrastructure continues to increase, so will the use of container-native tools; as a result, organizations that lack holistic monitoring approaches for these technologies ..read more
Datadog Blog
2w ago
Funnels can be powerful tools for analyzing your UX, but figuring out exactly which user journeys you want to study can be challenging. Even if you have an ideal journey in mind, users often take steps you don’t expect. As a result, your funnels—and therefore, your optimization efforts—can easily miss the most influential pages in your application. Indeed, how do you build the best possible funnel when there are thousands of paths users can take after any given page ..read more
Datadog Blog
3w ago
Visibility into the production performance of code iterations helps developers verify that application releases and updates are working as intended. However, when variables such as large-scale user requests and increased server load create issues that were absent during testing, developers will often need to pivot from investigating production data back to their coding environment to address errors and vulnerabilities. As a result, troubleshooting issues between development, testing, and production can feel cumbersome and slow developer velocity ..read more
Datadog Blog
3w ago
As of August 2023, only 3 out of 23 US government agencies were compliant with Office of Management and Budget (OMB) requirements for log management and security observability. These requirements are outlined in M-21-31, a 2021 memorandum that was issued following Executive Order 14028 on improving national cybersecurity. Until all of these agencies implement the new requirements, the federal government’s ability to fully detect, investigate, and remediate cybersecurity threats will be constrained ..read more
Datadog Blog
1M ago
Network security services like Google Cloud Armor enable you to filter incoming traffic so that you can prevent attacks from overwhelming your system or from reaching critical components of your application. However, these services often handle threats automatically, making it difficult to gain visibility into attempted security breaches. To better protect the entire attack surface of your application—from the network perimeter to your code—you need to know which IP addresses are linked to these attacks, what areas of your application are being targeted, and how the attacks are being carried o ..read more