Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

The Why and What of AWS Lambda Monitoring

Serverless architectures are the rental tux of computing. If you’re using AWS to manage and scale your underlying infrastructure, you’re renting compute time or storage space. Your Lambda functions are the tie or cummerbund you purchase to customize your rental. Using the AWS event-driven architecture improves business agility, allowing you to move quickly. Lambda is the on-demand compute services that runs custom code driving an event’s response.

Troubleshooting Cloud Traffic Inefficiencies with Kentik AI

Balancing cost efficiency and high performance in cloud networks is a constant challenge, especially when misconfigurations or inefficient routing lead to inflated costs or degraded performance. Learn how Kentik Journeys simplifies traffic analysis, helping cloud engineers identify inefficiencies like unnecessary Transit Gateway routing.

State of Cloud Costs

Cloud spending continues to grow, but managing costs effectively remains a challenge for many organizations. In this video, Datadog Senior Product Manager Kayla Taylor dives into our recent State of Cloud Costs report—which analyzed AWS cloud cost data from hundreds of organizations—to understand the key factors driving cloud expenses. We explore the impact of adopting emerging compute technologies like Arm-based processors, GPUs, and AI capabilities, how usage patterns and previous-generation technologies affect cloud costs, and the role of AWS discount programs in cost management.

Monitor AWS Trainium and AWS Inferentia with Datadog for holistic visibility into ML infrastructure

AWS Inferentia and AWS Trainium are purpose-built AI chips that—with the AWS Neuron SDK—are used to build and deploy generative AI models. As models increasingly require a larger number of accelerated compute instances, observability plays a critical role in ML operations, empowering users to improve performance, diagnose and fix failures, and optimize resource utilization.

How Are Cloud VPNs the Backbone of Secure Remote Access?

At a time when remote work and cloud-based solutions are shaping the business world, secure access to data has become essential. Cloud VPNs (Virtual Private Networks) are central to this process, offering secure, scalable, and efficient solutions for remote access. Unlike traditional VPNs, which operate on-premises, Cloud VPNs integrate directly with cloud environments, making them indispensable for modern organizations reliant on cloud infrastructures and remote workforces.

"With great power..." what Spiderman can teach us about sustainable growth for the data centre sector

The Foundations of the Future report recently commissioned by techUK, and developed by Henham Strategy, raises many points for consideration. It is an important attempt at quantifying the UK’s data centre assets. As a sector, the UK data centre industry is worth £4.7 billion in Gross Value Added (GVA) annually, supporting 43,500 jobs and contributing £640 million in tax revenue to the exchequer.

ECS Vs. Kubernetes: A Detailed Guide To Container Solutions

Containers improve application development with portability, efficiency, and scalability while accelerating deployments. Amazon ECS and Kubernetes are two of the top choices for container orchestration, but how do they stack up against each other? In this guide, we’ll break down the key differences, helping you choose the right solution for your containerization needs.

How to query private network data without an agent using AWS and Grafana Cloud

Connecting to data sources in a private network or an Amazon Virtual Private Cloud (Amazon VPC) can require extra attention to the network security configuration to prevent unintended network exposure. For example, if you wanted to query a network-secured data source, like a MySQL database or an Elasticsearch cluster, that is hosted in an on-premises private network, you would need to open your network to inbound queries from a range of IP addresses.

Secure your cloud environment from end to end with Datadog Infrastructure-as-Code Security

Infrastructure-as-code (IaC) tools like Terraform and CloudFormation allow teams to define, manage, and provision their cloud infrastructure using code, as opposed to clicking through consoles or executing commands via a CLI. IaC adoption is now widespread and helps teams increase productivity and efficiency, but it also introduces new surface area for mistakes, defects, and other risks.

Getting Started with Terraform on Azure

This podcast episode features a discussion led by Lex and Arnav Sharma, a Microsoft MVP and certified trainer, focusing on Terraform and its application in Microsoft Azure. Arnav provides insights on getting started with Terraform, emphasising its benefits such as automation, consistency, scalability, and cost efficiency in managing cloud resources through infrastructure as code (IaC).