Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Software Maintenance Best Practices for 2023

Businesses rely on software solutions increasingly in our modern age, and it’s constantly evolving. Compared to some of the software being used in the early 2000s, we’ve seen large changes, resulting in more complex frameworks, which come with their own unique changes. As software and systems become more complex, so increases the probability of errors occurring and the level of jeopardy those errors might present.

Automate end-to-end processes and quickly respond to events with Datadog Workflow Automation

Developer, SRE, IT, and security teams often perform complex and error-prone processes in response to disruptions and changes in their systems. Relying on these processes requires a significant amount of time switching between tools to gather the relevant context needed for remediation, domain expertise, and the manual execution of tasks for incident management—which can significantly prolong disruptions and downtime.

Terraform Import: What It Is and How to Use It

In this post we’ll explore Terraform Import, a powerful command-line tool that allows you to bring existing infrastructure under Terraform management. We’ll cover what Terraform Import is, its common use cases, and how to use it effectively. Additionally, we’ll discuss some limitations you should be aware of when using Terraform Import.

CRLF Injection, Explained: An In-Depth Guide

In this in-depth guide we’ll explore CRLF injection, a web application security vulnerability that can have severe consequences. First, we’ll cover what CRLF injection is, the types of CRLF injection attacks, and their potential impacts. Additionally, we’ll discuss similarities with other attacks, payloads used in these exploits, and how to prevent CRLF injection. Finally, we’ll touch on the role of OWASP in addressing this security risk.

Docker container security: demystifying FIPS-enabled containers with Ubuntu Pro

In today’s rapidly changing digital environment, the significance of robust Docker container security measures cannot be overstated. Even the containerised layer is subject to compliance standards, which raise security concerns and compliance requirements. Docker container security measures entail safeguarding our lightweight, appliance-type containers –each encapsulating code and its dependencies– from threats and vulnerabilities.

Choosing the Best Options to Run Kubernetes on AWS

Kubernetes is the most widely used container orchestration platform, and you will see many tech giants using Kubernetes in their solutions. Its built-in scalability, flexibility, and container orchestration capabilities make it an ideal choice for enterprise applications requiring high availability and robustness. When deciding which Kubernetes solution to select, we come across many options, including Rancher, Amazon Elastic Kubernetes Service (EKS), self-hosted Kubernetes, Kops, Kubeadm, and Qovery.

What is ESXi?

ESXi, short for Elastic Sky X Integrated, is a groundbreaking virtualization solution engineered by the tech giant VMware. Functioning as a type-1 hypervisor, ESXi stands out from other solutions due to its ability to run directly on the system hardware without the need for an underlying operating system. By providing a platform where virtual machines can efficiently function and interact, ESXi has emerged as an indispensable component in today’s technology-driven business ecosystem.

Streamline your CI testing with Datadog Intelligent Test Runner

Modern continuous integration (CI) practices enable development teams to quickly and efficiently build and deploy application code to a shared codebase. However, deploying new code is typically accompanied by tests, and as the codebase expands, this results in a proportionately larger test suite.