Operations | Monitoring | ITSM | DevOps | Cloud

How to

How to Perform a Forensic Analysis After a Security Breach

In this Kentik demo, Phil Gervasi shows how to perform a forensic analysis after a security breach. Leveraging Kentik's robust visibility into public cloud traffic, we showcase how engineers can effectively identify, analyze, and respond to security incidents. Through a hypothetical scenario, we trace a security alert from its origin—a suspected attack on an Azure-hosted system—to its resolution. Using tools like the Kentik Map and Data Explorer, we identify the attacker's entry point, compromised internal devices, and potential data exfiltration activities.

How Modern Retailers Approach Software Testing (4 Steps)

In this webinar clip from "Ensuring performance: How major retailers leverage user traffic to validate code changes", Speedscale Co-founder, Nate Lee, shares how modern retailers are thinking about and approaching software testing in increasingly dynamic and complex environments.

eCommerce Load Testing (Step 2): Capture Traffic

In this webinar clip from "Ensuring performance: How major retailers leverage user traffic to validate code changes", Speedscale Co-founder, Nate Lee, explains what comes next after selecting the business-critical APIs to test first: capturing traffic. Capturing traffic for the service can be done through tools like Speedscale, GoReplay, VCR, K6, and JMeter.

How to manually instrument iOS Applications with OpenTelemetry

In this tutorial, we dive into the practical application of OpenTelemetry in an iOS project built with SwiftUI. We demonstrate how to set up the OpenTelemetry SDK, generate spans, and send them to a configured OpenTelemetry collector. Our example application displays a random sentence every few seconds. Each sentence generation process is instrumented with OpenTelemetry spans, which include an attribute representing the word count of the sentence.

How to Build a Change Management Workflow

Change Management (or Change Enablement, depending on which ITIL version you prefer) provides a formalized way to consistently handle the changes required to improve IT services, IT and business operations and outcomes, and ultimately customer experience. Having a Change Management process has certain advantages, such as: For that reason, the smart thing to do is to have a proper workflow in place to address the three types of changes established by ITIL 4: standard changes, emergency changes, and normal changes.

Container Security Fundamentals - Linux Namespaces (Part 4): The User Namespace

In this video we continue our examination of Linux namespaces by looking at some details of how the user namespace can be used to de-couple the user ID inside a container from the user ID on the host, allowing a container to run as the root user without the risks of being root on the host. To learn more, read our blog on Datadog’s Security Labs site.

Integrate Monitoring as Code into your Software Development Lifecycle

Learn how the new Checkly features (code exporter and activity log) enable you to integrate Monitoring as Code into your Software Development Lifecycle. Define and debug your monitoring resources during development, test your preview deployments and start monitoring productions with ease.

Custom Java Instrumentation with OpenTelemetry

Discover how to gain unparalleled visibility and traceability into your applications with our latest video! As an expansion of our blog post, this tutorial dives into the world of Site Reliability Engineering and IT Operations, guiding you step-by-step through the process of implementing a plugin for the OpenTelemetry Java Agent using its Extensions framework.