Datadog

datadog

How to monitor Lambda functions

As serverless application architectures have gained popularity, AWS Lambda has become the best-known service for running code on demand without having to manage the underlying compute instances. From an ops perspective, running code in Lambda is fundamentally different than running a traditional application. Most significantly from an observability standpoint, you cannot inspect system-level metrics from your application servers.

datadog

Monitor AWS IAM Access Analyzer findings with Datadog

As you monitor the health and performance of your infrastructure and applications, you also need to be able to identify potential threats to the security of those components. To help address this challenge, we’re pleased to announce that Datadog now integrates with AWS Identity and Access Management (IAM) Access Analyzer, a new IAM feature that helps administrators ensure that they have securely configured access to their resources.

datadog

Introducing Datadog Real User Monitoring

The performance of your website is a key element in the success of your business—slow page load times and errors can degrade the user experience, leading to customer churn, fewer ad impressions, or abandoned shopping carts. To give you end-to-end visibility into the real-time activity and experience of individual users, we’re excited to add Real User Monitoring (RUM) to Datadog.

datadog

Monitor your Arm VMs with Datadog

Acorn RISC Machine (Arm) processors were first released in 1985 to support low-power, low-cost computing. Because of their ability to deliver cost-effective performance, the next big use for Arm-based devices is in the cloud. AWS recently added a range of Arm-based EC2 instance types and is developing additional support (e.g., in Elastic Kubernetes Service). Meanwhile, Arm and Docker are working on tighter integration.

datadog

Monitor Amazon EKS on AWS Fargate with Datadog

AWS Fargate has steadily gained traction in Amazon Elastic Container Service (ECS) environments because it allows users to run containerized applications without thinking about their underlying infrastructure. Today, AWS announced that support for Amazon Elastic Kubernetes Service (EKS) on AWS Fargate is now generally available, giving Amazon EKS users the option to seamlessly manage their infrastructure with AWS Fargate instead of manually provisioning EC2 worker nodes.

datadog

Monitor AWS Lambda Provisioned Concurrency metrics with Datadog

Serverless computing continues to be a growing trend, with AWS Lambda as a main driver of adoption. Today, AWS released Provisioned Concurrency, a new feature that makes AWS Lambda more resilient to cold starts during bursts of network traffic. If you’re running a consumer-facing application, slow page loads and request timeouts can degrade the user experience and lead to significant revenue loss.

datadog

Monitoring AWS Lambda functions with Datadog

The “serverless” movement is taking the industry by storm and now, with Datadog, you can start monitoring your serverless applications and functions on AWS Lambda. As soon as you enable the Lambda integration, you’ll start to see your metrics in an out-of-the-box dashboard like the one above. Monitor and alert on AWS Lambda serverless functions in minutes with Datadog.

datadog

Monitor G Suite activity with Datadog

G Suite is a collection of cloud-based productivity and collaboration tools developed by Google. Today, millions of teams use G Suite (e.g., Gmail, Drive, Hangouts) to streamline their workflows. Monitoring G Suite activity is an essential part of security monitoring and audits, especially if these applications have become tightly integrated with your organization’s data.

datadog

Announcing Datadog Security Monitoring

With the growing complexity and velocity of security threats in dynamic, cloud-native environments, it’s more important than ever for security teams to have the same visibility into their infrastructure, network, and applications that developers and operations do. Conversely, as developers and operations become responsible for securing their services, they need their monitoring platform to help surface possible threats.