Operations | Monitoring | ITSM | DevOps | Cloud

Expand your monitoring reach with the Datadog Marketplace

The Datadog Partner Network (DPN) is a rapidly growing registry of hundreds of leaders in the cloud service industry who choose Datadog to meet their infrastructure-monitoring needs. Partners are well-acquainted with the more than 400 technology integrations available to Datadog customers, but with the huge diversity in technical stacks used by our customers, there’s always demand for more customization and flexibility.

Enable preconfigured alerts with Recommended Monitors

Datadog’s more than 400 integrations collect monitoring data from across your entire stack, giving you full visibility into the health and performance of your applications and infrastructure. Alerts are a crucial part of any monitoring workflow, as they draw your attention to problems in your system before they affect your users. But whether you’re migrating to a new environment or integrating a new technology into your stack, it’s not always clear what data you should alert on.

My first Kubernetes cluster: Amazon EKS review + tutorial

During my career, I’ve taken part in many on-call rotations and post-mortems. The longest on-call rotation I’ve ever had — no breaks, vacations, or holidays — lasted for a whopping 2.5 years at Lucid Software. I’m jaded. I strongly prefer stability to tinkering with shiny new toys. Very few software engineers start this way, but enough of them make the transition after having been bit enough times by a bad release.

Civo Community Meetup #2: CI/CD focus w/ Sam Weston and Johannes Tegnér

For our second community meetup we focussed on using Civo for CI/CD through GitOps and Github actions for cloud native application development This installment featured talks from our CTO Andy, our Developer Advocate Kai, and guest talks from community members Sam Weston and Johannes Tegnér. The talks touched on a wide variety of topics within CI/CD, from automating builds to monitoring and observability. Here's what was on the agenda...

The Pain of Debugging WebAssembly

If you know anything about WebAssembly (WASM), it’s probably that WASM lets you execute code compiled from languages such as C, C++, Rust, or others in the browser at almost native speeds. You might be less familiar with the fact that WASM is not only an interesting technology in the browser, but also in other environments that require fast sandboxing. As such, WASM has found some popularity with edge computing and as a lightweight docker replacement for certain situations.

Automate registry scanning with Harbor & Sysdig

Discover what registry scanning is, how it helps with shifting security left, and how you can implement it using Harbor and Sysdig. Shifting security left is all about moving security to the earliest possible moment in the development process, dramatically improving “time to fix” and security impact. In this article, we’re going to show you how to shift left with Harbor registry and Sysdig Secure.

Disaster Recovery Preparedness for Your Kubernetes Clusters

In the pre-Kubernetes, pre-container world, backup and recovery solutions were generally implemented at the virtual machine (VM) level. That works for traditional applications when an application runs on a single VM. But when applications are containerized and managed with an orchestrator like Kubernetes, this system falls apart. That means effective disaster recovery (DR) plans for Kubernetes must be designed for containerized architectures and natively understand the way Kubernetes functions.

How to optimize your logging costs

CIOs see data costs as their greatest logging challenge to overcome, according to this survey we collaborated on with IDC. If you’re running significant production operations, you’re almost certainly generating 100’s of GB of log data every day. Naturally, you’re also monitoring those logs and querying for incident investigations. However, most log data is never queried or analyzed, yet makes up the majority of logging costs.

Ensuring Availability and Security for Remote Workers

The year 2020 has seen various changes throughout the world but no change has seen more of an impact than the Corona-virus. During this epidemic, workers from all industries have moved from a traditional office-based role to WFH (Working From Home). It’s known as a business transforms it brings new risks associated with it. New and emerging technologies and the practices they involve require operational, policy and security measures to be implemented and evolved over time.