Operations | Monitoring | ITSM | DevOps | Cloud

AI Agents Console: Monitor the behavior and interactions of any AI agent in your stack

With Datadog's AI Agents Console, you can monitor the behavior and interactions of any AI agent that’s a part of your enterprise stack, whether that’s a computer use agent like OpenAI’s Operator, IDE agent like Cursor, DevOps agent like Github Copilot, enterprise business agent like Agentforce, or your internally built agents. You'll have full visibility into every agent's actions, insights into the security and performance of your agents, analytics on user engagement, and measurable business value from every agent, all in a centralized location.

Multi Factor Authentication for Synthetic Monitoring for AVD

Today, I’ll cover some of the basics of monitoring Multi-Factor Authentication and why ensuring MFA is implemented is essential, particularly in environments where remote access is possible. I’ll cover some recent, specific case studies where a lack of MFA has led to security breaches and the mechanisms the bad actors used.

Introducing Schedule Rotations: One Schedule, Many Rotations, Total Coverage

When coverage gets complicated, Schedule Rotations keeps it simple. On-call can get real messy, real fast. One minute you’ve got a neat little schedule for the two people rotating primary and secondary. Next thing you know, you’ve got engineers in three time zones, a new hire shadowing incidents, and your “simple” rotation has turned into a board game with no rules. So we fixed it.

Splunk Expands Data Management Capabilities To Include Ingest Monitoring

Managing data ingestion at scale is no easy task. As organizations onboard hundreds or even thousands of data sources into the Splunk platform for security, observability, and other business-critical use cases, it becomes increasingly complex to ensure data is consistently available and onboarded efficiently.

How we're killing YAML fatigue with our new K8s integration process

Kubernetes has rapidly grown in adoption, with more than 84% of surveyed users evaluating or actively using Kubernetes in some way. It has become the go-to container orchestration deployment. As we grow the Coralogix platform, we continuously go back and improve flows that we believe will have a high impact on our user base.

Diagnosing Wi-Fi failures that traditional tools miss: a case study

A global airline experienced persistent Google Meet connectivity issues with no apparent network infrastructure faults. While their APM tool offered visibility into network paths, it didn’t surface any local anomalies. Catchpoint’s endpoint monitoring, however, revealed performance degradation specifically on Wi-Fi Channel 44 (5GHz band), where signal strength dropped to -80 dBm compared to optimal ranges of -30 to -50 dBm.

The Digital Sovereignty Revolution: Why Big Tech Is Losing UK Trust

In a world where data is power, UK businesses are demanding control. Civo’s latest whitepaper, The Digital Sovereignty Revolution, uncovers the top challenges UK businesses face in securing true data sovereignty from eroding trust in Big Tech to geopolitical instability. Our latest research, based on a survey of 1,000+ UK IT decision-makers, reveals the extent to which sovereignty is reshaping the UK's tech sector. From the risks of relying on US-based providers to the benefits of multi-cloud strategies, the whitepaper explores key trends and what they mean for UK businesses.