Operations | Monitoring | ITSM | DevOps | Cloud

%term

Monitor dbt Cloud with Datadog

Data build tool (dbt) is an open source service that cleans, aggregates, and models raw data into organized, analytics-ready formats within a data warehouse. dbt Cloud, a fully managed platform by dbt Labs, extends dbt’s capabilities with advanced features such as scheduling, testing, and monitoring, accessible directly from your browser.

Reliability vs Availability: A complete guide to system performance metrics

In an always-digital world where users expect reliable services, businesses must measure two critical metrics: reliability and availability. However, reliability and availability are terms often used interchangeably but understanding the difference is crucial when building systems that users can trust and depend on. Both metrics are vital, but depending on your use case, you might prioritize one over the other. Take the 2017 AWS S3 outage.

All you need to know about Horizontal Pod Autoscaling in Kubernetes

For most organizations, Kubernetes is the preferred containerization platform thanks to its scaling capabilities. Scaling is more than a mere technical endeavor—it helps maintain reliability, efficiency, and smooth user experiences while handling huge data without any business disruptions. It also aids in reducing business expenditures by cutting down on manual labor and avoiding deployment failures.

Kubernetes cluster metrics 101

Kubernetes clusters facilitate the management of containerized applications. Imagine coordinating a seamless flow of workloads across servers, ensuring they operate in harmony, regardless of scale. This is exactly what Kubernetes clusters can do for the smooth deployment of your applications. Read on to learn more about Kubernetes clusters, including how to manage them using our list of critical metrics.

Monitoring database exposure on Kubernetes and VMs

This week, security researchers at Wiz published a report about an internal database at DeepSeek being exposed to the internet. This kind of security risk is surprisingly common and can affect any company. The only way to prevent it is through continuous monitoring. But in modern infrastructures, services can be exposed in many different ways, making detection tricky. At Coroot, we realized that the telemetry data we already collect can help identify these risks — without requiring any extra setup.

IT Made Simple: Automate Endpoint Management with NinjaOne

Join NinjaOne for a dynamic webinar designed to equip IT leaders with the tools to drive efficiency and innovation. In today’s complex IT landscape, the need for efficiency, security, and visibility has never been greater. Disconnected tools create silos, increase operational overhead, and leave IT teams struggling to deliver consistent results. During this event, you'll see how NinjaOne simplifies workflows, empowers IT teams to elevate help desk performance, and provides strategic insights that position your organization for success.

3 Approaches to AI That Every IT Manager Should Know

Our AI by Design series explored responsible approaches to developing artificial intelligence (AI) systems. Now, it’s time to get practical about leveraging this exciting technology to transform our daily operations. Our upcoming blog series identifies three types of AI adoption—diagnostic, assistive, and automated—and helps you determine where these distinct applications fit into your workflow.

Streamlining CI/CD Pipelines with Automated Policy Checks

Continuous Integration and Continuous Deployment (CI/CD) pipelines power modern DevOps. They enable teams to deliver software faster, with greater reliability and confidence. However, as development accelerates, ensuring security, compliance, and quality becomes increasingly complex. Automated policy checks streamline CI/CD pipelines by addressing these challenges directly.