Operations | Monitoring | ITSM | DevOps | Cloud

DNS

Avoid DNS Outages: Decrease Downtime with DNS Monitoring

Cloudflare, Amazon, Microsoft, and Google are some of the largest managed Domain Name Server (DNS) service providers in the world. They are also just a few of the many DNS providers that have struggled with DNS outages. In fact, Cloudflare had an outage earlier this year due to a bad software deployment.

Monitor CoreDNS with Datadog

CoreDNS is a DNS server that can also provide service discovery for microservice-based applications. It’s the default DNS server in Kubernetes, providing name resolution and service discovery for the services operating in the cluster. CoreDNS is easily customizable, so you can define how it should act on each request beyond simply executing a DNS lookup.

What is DNS? Some basic concepts

What is DNS? DNS is the Domain Name System, or the hierarchical system of nomenclature that orders the names of members who connect to IP networks, such as the Internet. In this article we will briefly learn what DNS is, how it works, what it is used for and some of its advantages and disadvantages. What is DNS? Shall we begin?

Types of DNS Attacks and How Application Monitoring Can Help

DNS, the Domain Name Service, is the Internet service that translates IP addresses into hostnames, and visa versa. It enables you to type www.exoprise.com in a browser, or send an email to someone at that domain, and have your request actually go to 35.172.52.247. As a vital part of the Internet infrastructure, DNS attacks can have a serious impact on your online operations, including access to your website and email.

DNS Hijacking: What You Need to Know

Crashed websites and slow loading pages can be devastating for any site owner. But there’s another type of threat that often goes undetected. A report published by FireEye on Thursday details a particular type of DNS hijacking that allows hackers to easily steal information. These attacks have been going on for approximately two years and involve three different methods that compromise websites without alarming users.