Operations | Monitoring | ITSM | DevOps | Cloud

December 2020

Key Kubernetes audit logs for monitoring cluster security

Kubernetes continues to be a popular platform for deploying containerized applications, but securing Kubernetes environments as you scale up is challenging. Each new container increases your application’s attack surface, or the number of potential entry points for unauthorized access. Without complete visibility into every managed container and application request, you can easily overlook gaps in your application’s security as well as malicious activity.

Best practices for monitoring authentication logs

If you are running a user-facing web application, you likely implement some form of authentication flow to allow users to log in securely. You may even use multiple systems and methods for different purposes or separate groups of users. For example, employees might use OAuth-based authentication managed by a company-provided Google account to log in to internal services while customers can use a username and password system or their own Google credentials.

Share Datadog dashboards securely with anyone outside of your organization

Datadog dashboards provide a unified view of your application, infrastructure, and business data, giving stakeholders the context they need to make decisions. Sharing dashboards publicly is useful when you want to make them easily accessible to a large audience. But oftentimes, your dashboards include sensitive information, which is why you need finer-grained controls over the data you share—and who you share it with.

Send SMS alerts with webhooks and Twilio

When an alert triggers in your application or environment, you want your team to know as soon as possible so you can troubleshoot quickly and minimize any user-facing issues. Datadog can automatically alert you via email and collaboration services like Slack and PagerDuty. The simple, real-time communication provided by SMS can also be an effective way to alert your team.

Monitor applications running on VMware Tanzu Application Service

Cloud Foundry is an open source deployment and orchestration platform that gives developers a readymade workflow for launching applications without configuring the underlying infrastructure. VMware Tanzu Application Service for VMs (TAS) is a commercially available certified platform for Cloud Foundry that provides complementary products like a partner network, auto-scaling CLI, and operations interface, and is used by enterprise-level customers like T-Mobile, The Home Depot, and Comcast.

Collect and monitor Microsoft 365 audit logs with Datadog

Microsoft 365 is a suite of cloud-based productivity and communication services that includes Microsoft Office applications (including OneNote and OneDrive) as well as other popular Microsoft tools like Skype and Teams. Microsoft 365 tools and services are at the core of many organizations’ data management and day-to-day workflows, so monitoring activity across your environment is key to making sure that these services remain secure and meet compliance standards.

Explore your data effortlessly with the Datadog Clipboard

When investigating a complex system—or learning about it for the first time—you need to explore metrics, traces, logs, and other kinds of data. But as you navigate across different views of your data in dashboards, alert notifications, flame graphs, and so on, it can be hard to keep track of what you have already seen. When a potential issue comes up and time is tight, the last thing you need is to spend time remembering a crucial graph or finding the right browser tab.

End-to-end application monitoring with Datadog

For complete visibility into the performance of your applications, you need telemetry data—traces, metrics, and logs—that describes activity across your entire stack. But if you’re using multiple monitoring tools, your data can end up in silos, making it difficult to troubleshoot issues that affect your user experience.

Unify APM and RUM data for full-stack visibility

Without unified visibility across your entire stack, it can be difficult to investigate backend dependencies when troubleshooting frontend issues, or to track the source of database failures that originate from bad browser requests. Full-stack visibility gives you the insight you need to pinpoint and resolve incidents quickly.

Tell data-driven stories with Collaborative Notebooks

Whether you’re deciding on follow-up items for a postmortem, submitting a request-for-comments for review, or creating an executive report, making sense of all the available data and collaborating with others to tell a clear, data-driven story can be difficult. When there are multiple stakeholders and teams working together, it can be hard to manage the back-and-forth process of feedback and revision to ensure you have up-to-date information.

Monitor your workflows with Datadog SSL, TLS, and Multistep API tests

API tests are key to ensuring your applications receive and respond to requests efficiently. For example, a slow API endpoint or an unexpected timeout in processing a request can significantly affect user experience, so API tests can help you monitor the performance of your endpoints and the overall health of your applications.

Integrate Datadog Compliance Monitoring with your AWS Well-Architected workloads

Many of our customers rely on the Amazon Web Services (AWS) Well-Architected Framework as a guide to build safe, secure, and performant applications in the cloud. AWS offers the Well-Architected Review (WAR) Tool as a centralized way to track and trend adherence to Well-Architected best practices. It allows users to define workloads and answer a set of questions regarding operational excellence, security, reliability, performance efficiency, and cost optimization.

Datadog on Serverless

The Datadog Security Platform team leverages Serverless to ingest security events across many different cloud providers, deployment platforms, and devices. These security events are then transformed and shipped to a data lake to help defend and protect the platform as a whole. Once there, these ingested events are used to drive internal investigations, create internal security alerts, and reason about security incidents.

Monitor Windows hosts with Network Performance Monitoring

If you’re running a mix of Windows– and Linux–based hosts in hybrid or cloud environments, network monitoring is especially important—and especially difficult. As network topologies are becoming increasingly distributed and dynamic, you need a quick way to identify connectivity issues across regions, services, and operating systems.

Accelerate security investigations with Datadog Threat Intelligence

Attackers (i.e., threat actors) often reuse techniques or resources, such as IP addresses, hashes, and domains, in multiple attempts to find and exploit vulnerabilities in your systems. Defenders can categorize this data as indicators of compromise (IOCs) and create collections of IOCs in order to look out for potential attacks. These IOC collections are known as threat intelligence.

Monitor Microsoft Azure Stack HCI with Datadog

Hyperconverged infrastructure (HCI) gives organizations more flexibility and control when building and securing their virtualized on-premises environments. Microsoft’s Azure Stack HCI is an operating system-as-a-service built for HCI backends that lets organizations deploy and manage their virtualized resources alongside any Azure infrastructure they are running.

Automate vulnerability analysis with the Datadog GitHub Action

To enhance and automate your vulnerability analysis, we’re excited to launch the Datadog Vulnerability Analysis GitHub Action. The action enables easy integration between your application, Datadog Continuous Profiler, and Snyk’s vulnerability database to provide actionable security heuristics. The action can be installed directly from the GitHub Marketplace, and does not require you to manage any additional scripts or infrastructure.

Debug application issues with APM and Network Performance Monitoring

With the advanced containerization that has become the norm in the modern cloud, your infrastructure is likely more distributed, and thus more exposed to networking issues, than ever before. When troubleshooting application performance issues, this can make it difficult to link the symptoms you observe through monitoring the “golden signals” (requests, latency, and errors) on individual endpoints in your application to their underlying root causes.

Monitor AWS Lambda functions deployed using container images

The serverless ecosystem has changed dramatically since it first began gaining popularity with developers who want a faster, easier way to deploy their applications. Today, it has matured into a compelling strategy for building modern, enterprise-scale products. But, as more and more organizations adopt rapidly changing technologies, developers are often left with gaps in visibility between key applications.

Announcing Datadog support for Amazon EKS Distro

Kubernetes has become the de facto standard for container orchestration, making it a key piece in the containerization strategy of many users. Amazon EKS Distro (EKS-D) is a Kubernetes distribution from AWS that lets you run on-premise clusters using the same tested Kubernetes versions, security features, and tooling that power Amazon EKS. This means that EKS-D is compatible with the Kubernetes tools and processes you’re already using, making it easy to operate in-house Kubernetes clusters.