Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Getting started with Jaeger to build an Istio service mesh

Service mesh provides a dedicated network for service-to-service communication in a transparent way. Istio aims to help developers and operators address service mesh features such as dynamic service discovery, mutual transport layer security (TLS), circuit breakers, rate limiting, and tracing. Jaeger with Istio augments monitoring and tracing of cloud-native apps on a distributed networking system.

A DevOps-Principled Approach to Inclusion, Diversity, and Belonging

Many organizations are transitioning to DevOps, a software practice where developers both write and operate their code. This transition is often driven by digital transformation and the need to innovate faster while being always on, 24/7. But what does DevOps have to do with diversity, inclusion, and belonging?

Fourteen Free SQL Software Tools

Our databases are the ones that keep the Internet alive. There has even been talk for some years about the development of operating systems with which users do not have direct contact with the files, but their personal files are stored in a local DB. In fact, we already see how there are online services that do this for us, such as Google Drive or Nextcloud, the latter written under free license Affero.

Notes from Observability Roundtables

The Velocity conference happened recently, and as part of it we (Honeycomb) hosted a sort of reverse-panel discussion, where you talked, and we listened. You may be aware that we’re in the process of developing a maturity model for the practice of observability–and we’re taking every opportunity we have to ask questions and get feedback from those of you who are somewhere along the path.

Introducing Metrics from Logs and Log Rehydration

As your application grows in size and complexity, it becomes increasingly difficult to manage the number of logs it generates and the cost of ingesting, processing, and analyzing them. Organizations often have little control over fluctuations in the volume of logs generated—and the resulting costs of collecting them—so they are forced to limit the number of logs generated by their applications, or to pre-filter logs before sending them to their log management platform.

Introducing Datadog Network Performance Monitoring

Network Performance Monitoring is currently available in private beta. Request access here. Your applications and infrastructure components rely on one another in an increasingly complex fabric, regardless of whether you run a monolithic application or microservices, and whether you deploy to cloud infrastructure, private data centers, or both.

Dash 2019: Guide to Datadog's newest announcements

At Dash 2019, we are excited to share a number of new products and features on the Datadog platform. With the addition of Network Performance Monitoring, Real User Monitoring, support for collecting browser logs, and single-pane-of-glass visibility for serverless environments, Datadog now provides even broader coverage of the modern application stack, from frontend to backend.

What Is User Activity Monitoring?

User Activity Monitoring (UAM) tracks the behavior of internal end-users—employees, subcontractors, partners, and so on—on a company’s networks, devices, and other IT resources. UAM, sometimes also called employee monitoring, may be deployed for a number of reasons, such as providing insight into the productivity of both individual employees and the company as a whole. Is Employee X spending too much time browsing the internet for non-business purposes during work time?

Penn National Insurance improves its remote worker end user experience with Goliath

Penn National Insurance needed to adapt to its growing remote workforce and deliver a seamless user experience to increase employee satisfaction, performance and productivity. In response, the IT team rolled out its virtual workspace initiative, proving to be one of its most challenging IT projects.