Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Datadog Network Performance Monitoring

You can now analyze and map network traffic between teams, services, data centers, security groups, or any other subset of your environment. Visualize high-level traffic flows, and drill down in a few clicks to granular details about individual components or services. Network Performance Monitoring is fully integrated with the rest of Datadog, so you can seamlessly pivot to correlated metrics, request traces, and logs for troubleshooting.

Kubernetes & Tigera: Network Policies, Security, and Auditing

Of course, Tigera’s ability to provide Kubernetes pod networking and facilitate service discovery is extremely valuable, but its real superpower is that both Tigera’s commercial offerings and open-source Tigera Calico can implement network security policies inside a Kubernetes cluster.

Meeting PCI DSS Network Security Requirements in Kubernetes Environments

Compliance standards such as PCI DSS have assumed that traditional characteristics and behaviors of the development and delivery model would continue to be constant going forward. With the Container/Kubernetes revolution, that set of assumptions is no longer entirely correct. Attend this webinar and learn about what’s changed, how those changes weaken your compliance and control environment, and what you can do to adjust to the new reality.

How To Extend Firewalls to Kubernetes to Stop Breaking Existing Security Architectures

Security teams use firewalls to secure their production environments, often using a zone-based architecture, and Kubernetes does not deploy well to that architecture. Application teams are launching new business-critical applications on Kubernetes and are aggressively moving to production. A clash is bound to happen.