Operations | Monitoring | ITSM | DevOps | Cloud

Monitor Microsoft Azure Stack HCI with Datadog

Hyperconverged infrastructure (HCI) gives organizations more flexibility and control when building and securing their virtualized on-premises environments. Microsoft’s Azure Stack HCI is an operating system-as-a-service built for HCI backends that lets organizations deploy and manage their virtualized resources alongside any Azure infrastructure they are running.

Automate vulnerability analysis with the Datadog GitHub Action

To enhance and automate your vulnerability analysis, we’re excited to launch the Datadog Vulnerability Analysis GitHub Action. The action enables easy integration between your application, Datadog Continuous Profiler, and Snyk’s vulnerability database to provide actionable security heuristics. The action can be installed directly from the GitHub Marketplace, and does not require you to manage any additional scripts or infrastructure.

Debug application issues with APM and Network Performance Monitoring

With the advanced containerization that has become the norm in the modern cloud, your infrastructure is likely more distributed, and thus more exposed to networking issues, than ever before. When troubleshooting application performance issues, this can make it difficult to link the symptoms you observe through monitoring the “golden signals” (requests, latency, and errors) on individual endpoints in your application to their underlying root causes.

Monitor AWS Lambda functions deployed using container images

The serverless ecosystem has changed dramatically since it first began gaining popularity with developers who want a faster, easier way to deploy their applications. Today, it has matured into a compelling strategy for building modern, enterprise-scale products. But, as more and more organizations adopt rapidly changing technologies, developers are often left with gaps in visibility between key applications.

Announcing Datadog support for Amazon EKS Distro

Kubernetes has become the de facto standard for container orchestration, making it a key piece in the containerization strategy of many users. Amazon EKS Distro (EKS-D) is a Kubernetes distribution from AWS that lets you run on-premise clusters using the same tested Kubernetes versions, security features, and tooling that power Amazon EKS. This means that EKS-D is compatible with the Kubernetes tools and processes you’re already using, making it easy to operate in-house Kubernetes clusters.

Datadog APM recognized as Gartner Peer Insights Customers' Choice

Datadog is excited to celebrate our selection as Customers’ Choice for Application Performance Monitoring in Gartner Peer Insights “Voice of the Customer.” Datadog Application Performance Monitoring empowers customers to monitor, troubleshoot, and optimize end-to-end application performance in a single pane of glass.

Highlights from KubeCon + CloudNativeCon 2020

CNCF’s KubeCon + CloudNativeCon is the most important event for Kubernetes adopters and technologists. The first KubeCon, which took place in San Francisco in November 2015, gathered around 500 developers and early adopters to discuss the technology and its future. Its 2020 North America edition marked its fifth anniversary and had 25,000 registrants.

Datadog's AWS re:Invent 2020 guide

In Q4 of every year since 2012, AWS has flooded the Las Vegas strip with thousands of AWS staff, partners, and customers for a week of keynote sessions, announcements, workshops, and more. In a year like no other, we’re gearing up for a re:Invent like no other! As a long-time AWS partner, we look forward to re:Invent every year. We enjoy meeting you face to face, sharing the latest in monitoring and security, and learning a thing or two in the process.

Secure your infrastructure in real time with Datadog Runtime Security

From containerized workloads to microservice architectures, developers are rapidly adopting new technology that allows organizations to scale their products at unprecedented rates. In order to make sense of these complex deployments, many teams are abstracting applications away from the environments in which they run. Because of this trade-off, developers and security teams lose the access to the unified context from infrastructure to application needed to fully secure their services.