Operations | Monitoring | ITSM | DevOps | Cloud

Microservices

Monitor AWS App Mesh and Envoy with Datadog

Envoy proxies communication among microservices. It is a key component in many service-oriented architectures—and one that offers a unique opportunity to gain visibility into your service mesh. We’re pleased to announce that Datadog integrates with Envoy as well as AWS App Mesh, a new hosted service based on Envoy that dynamically configures your service mesh proxies.

Blue-Green Deployment Strategies for PCF Microservices

Blue-green deployment is a well-known pattern for updating software components by switching between simultaneously available environments or services. The context in which a blue-green deployment strategy is used can vary from switching between data centers, web servers in a single data center, or microservices in a Pivotal Cloud Foundry (PCF) deployment.

3 Things to Know While Monitoring Containers and Microservices

The adoption of microservices and container technologies has increased rapidly as DevOps teams look into faster release cycles for application delivery. However, these ephemeral technologies dramatically increase the complexity of managing, visualizing and mapping dependencies between components in your IT infrastructure. Microservices are dynamic and can scale horizontally in an instant, which poses challenges in monitoring when the locations of containers and services are constantly changing.

Monitoring microservices: Everything you need to know [2018]

Monitoring remains a critical part of managing any IT system, while the challenges associated with monitoring microservices are especially unique. An example is how traditional monolithic systems, deployed as a single executable or library, have different points of failure and dependencies than those deployed with a microservices architecture.

Microservices Security Summer Camp Session 3 - How to Evaluate Microservices Security Solutions

When evaluating a security solution for modern applications, you’ll need a checklist based on the best practices. Many checklist items are standard and you can adopt those from this webcast. Others may be specific to your environment and compliance requirements and we will be covering those in the Q&A.

Microservices Security Summer Camp Series 2 - Best Practices for Securing Infrastructure

Microservice applications are packaged as containers and require orchestration by infrastructure management software like Kubernetes. Kubernetes will be the focus of this discussion on best practices to secure these dynamic environments. Join us to learn the tips and traps for securing the infrastructure for modern applications.

Gain Full Visibility into Microservices Architectures Using Kubernetes with Sumo Logic and Amazon EKS

Amazon Elastic Container Service for Kubernetes (Amazon EKS) is a managed service that makes it easyfor you to run Kubernetes on AWS without needing to install and operate your own Kubernetes clusters.