Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Monitor Red Hat Gluster Storage with Datadog

Red Hat Gluster Storage is a distributed file system, built on GlusterFS and operated by Red Hat for Linux environments. With its focus on scalability, low cost, and deployment flexibility across physical, virtual, and cloud-based environments, organizations use Gluster Storage in a variety of high-scale, unstructured data storage applications.

Datadog acquires Timber Technologies

Here at Datadog, we have always strived to build monitoring tools that are robust yet flexible. We are committed to continued innovation, and we believe that when it comes to creating new solutions that complement our customers' existing workflows, our work is never done. That’s why we’re excited to announce that Timber Technologies, the company behind Vector, is joining Datadog.

Datadog achieves FedRAMP Moderate Impact authorization

As government agencies accelerate migrating their operations to the cloud, they need to adhere to strict compliance and security standards. The Federal Risk and Authorization Management Program (FedRAMP) provides the standard that these agencies—and their private-sector partners—must meet to work and manage federal data safely in the cloud.

Monitor Azure IoT Edge with Datadog

Azure IoT Edge is a Microsoft Azure service that allows you to run containerized workloads on IoT devices. With IoT Edge and Azure IoT Hub, Azure’s device-management platform, organizations across science, manufacturing, energy production, and other industries can provision their IoT devices and workloads at the edge of their cloud networks for immediate in-unit computing, a necessity when running AI algorithms or parsing large datasets directly on IoT devices.

Monitor datacenters and network devices with Datadog

Modern datacenters can contain thousands of network appliances, such as routers, switches, firewalls, and servers, so it’s important for your monitoring strategy to provide comprehensive visibility into every piece of your infrastructure. Datadog Network Device Monitoring already allows you to collect a wealth of telemetry from all of your SNMP-managed devices, which are automatically discovered by the Datadog Agent.

Datadog NPM now supports Istio networking

Istio is an open source service mesh that provides an abstraction layer for network traffic between applications, so you can run canary deployments, implement circuit breakers, and otherwise manage the architecture of your network using high-level configuration files. As service meshes become increasingly popular among containerized environments, dev and ops teams need to ensure that Istio is healthy, performant, and routing traffic as intended to keep their network infrastructure running smoothly.

Datadog automatically surfaces actionable insights into your Lambda functions

Serverless platforms like AWS Lambda have helped accelerate application development by removing the need to provision and manage infrastructure resources. However, serverless architecture presents new monitoring challenges. Because AWS Lambda handles underlying infrastructure for you, you don’t have access to system-level metrics. Instead, you have to monitor your Lambda functions for insight into their performance and resource usage.

Monitor your NVIDIA Jetson IoT devices with Datadog

NVIDIA Jetson is a family of embedded, low-power computing boards designed to support machine learning and AI applications at the edge. Organizations use Jetson boards for complex video and image processing and analysis, automating build processes in factories, and improving city infrastructures. For example, Jetson-based devices enable cities to analyze traffic patterns with their existing traffic cameras in order to find ways to improve their most congested intersections.

Key Kubernetes audit logs for monitoring cluster security

Kubernetes continues to be a popular platform for deploying containerized applications, but securing Kubernetes environments as you scale up is challenging. Each new container increases your application’s attack surface, or the number of potential entry points for unauthorized access. Without complete visibility into every managed container and application request, you can easily overlook gaps in your application’s security as well as malicious activity.