Operations | Monitoring | ITSM | DevOps | Cloud

Datadog

Build Datadog workflows and apps in minutes with our AI assistant

Datadog is a central hub of information—enabling you to see logs, traces, and metrics from across your stack and providing a centralized source of notifications about potential issues. However, when Datadog notifies you of an issue, you often need to log in to other applications to fully assess and resolve it, which slows down mitigation.

Stream logs in the OCSF format to your preferred security vendors or data lakes with Observability Pipelines

Today, CISOs and security teams face a rapidly growing volume of logs from a variety of sources, all arriving in different formats. They write and maintain detection rules, build pipelines, and investigate threats across multiple environments and applications. Efficiently maintaining their security posture across multiple products and data formats has become increasingly challenging.

Optimize LLM application performance with Datadog's vLLM integration

vLLM is a high-performance serving framework for large language models (LLMs). It optimizes token generation and resource management to deliver low-latency, scalable performance for AI-driven applications such as chatbots, virtual assistants, and recommendation systems. By efficiently managing concurrent requests and overlapping tasks, vLLM enables organizations to deploy LLMs in demanding environments with speed and efficiency.

Get deeper visibility into your AWS serverless apps with enhanced distributed tracing

Serverless or event-driven applications can comprise many different distributed components, including serverless compute services such as AWS Lambda and AWS Fargate for Amazon ECS, as well as managed data streams, data stores, workflow orchestration tools, queues, and more. Having full end-to-end visibility into requests as they propagate across all of these parts of your application is crucial to monitoring performance, locating affected up- or downstream services, and troubleshooting issues.

Best practices for monitoring progressive web applications

Progressive web applications (PWAs) are a modern frontend architecture designed to provide a similar user experience to that of a native iOS, Android, or other platform-specific app. PWAs are built using common web platform technologies—such as, HTML, CSS, and JavaScript—and are intended not only to run in a browser and be accessed from the web, but also to be installed on users’ devices and accessed offline.

Identify deprecated Lambda functions with Datadog

AWS Lambda supports nearly any programming language by enabling developers to run serverless functions with either supported or custom runtimes. Once a runtime is deprecated, however, AWS will set dates for when you can no longer create or update functions using that runtime. You will then need to decide what course of action to take to ensure your Lambda functions continue running as expected.

Detect anomalies before they become incidents with Datadog AIOps

As your IT environment scales, a proactive approach to monitoring becomes increasingly critical. If your infrastructure environment contains multiple service dependencies, disparate systems, or a busy CI/CD application delivery pipeline, overlooked anomalies can result in a domino effect that leads to unplanned downtime and an adverse impact on users.

Datadog on Cloud Workload Identities

Datadog operates dozens of Kubernetes clusters, tens of thousands of hosts, and millions of containers across a multi-cloud environment, spanning AWS, Azure, and Google Cloud. With over 2,000 engineers, we needed to ensure that every developer and application could securely and efficiently access resources across these various cloud providers.

Detect and troubleshoot Windows Blue Screen errors with Datadog

Windows Blue Screen errors—also known as bug checks, STOP codes, kernel errors, or the Blue Screen of Death (BSOD)—are triggered when the operating system detects a critical issue that compromises system stability. To prevent further damage or data corruption, the OS determines that the safest course of action is to shut down immediately. The system then restarts and displays the well-known BSOD.