Operations | Monitoring | ITSM | DevOps | Cloud

Monitor applications running on VMware Tanzu Application Service

Cloud Foundry is an open source deployment and orchestration platform that gives developers a readymade workflow for launching applications without configuring the underlying infrastructure. VMware Tanzu Application Service for VMs (TAS) is a commercially available certified platform for Cloud Foundry that provides complementary products like a partner network, auto-scaling CLI, and operations interface, and is used by enterprise-level customers like T-Mobile, The Home Depot, and Comcast.

Collect and monitor Microsoft 365 audit logs with Datadog

Microsoft 365 is a suite of cloud-based productivity and communication services that includes Microsoft Office applications (including OneNote and OneDrive) as well as other popular Microsoft tools like Skype and Teams. Microsoft 365 tools and services are at the core of many organizations’ data management and day-to-day workflows, so monitoring activity across your environment is key to making sure that these services remain secure and meet compliance standards.

Explore your data effortlessly with the Datadog Clipboard

When investigating a complex system—or learning about it for the first time—you need to explore metrics, traces, logs, and other kinds of data. But as you navigate across different views of your data in dashboards, alert notifications, flame graphs, and so on, it can be hard to keep track of what you have already seen. When a potential issue comes up and time is tight, the last thing you need is to spend time remembering a crucial graph or finding the right browser tab.

End-to-end application monitoring with Datadog

For complete visibility into the performance of your applications, you need telemetry data—traces, metrics, and logs—that describes activity across your entire stack. But if you’re using multiple monitoring tools, your data can end up in silos, making it difficult to troubleshoot issues that affect your user experience.

Tell data-driven stories with Collaborative Notebooks

Whether you’re deciding on follow-up items for a postmortem, submitting a request-for-comments for review, or creating an executive report, making sense of all the available data and collaborating with others to tell a clear, data-driven story can be difficult. When there are multiple stakeholders and teams working together, it can be hard to manage the back-and-forth process of feedback and revision to ensure you have up-to-date information.

Monitor your workflows with Datadog SSL, TLS, and Multistep API tests

API tests are key to ensuring your applications receive and respond to requests efficiently. For example, a slow API endpoint or an unexpected timeout in processing a request can significantly affect user experience, so API tests can help you monitor the performance of your endpoints and the overall health of your applications.

Unify APM and RUM data for full-stack visibility

Without unified visibility across your entire stack, it can be difficult to investigate backend dependencies when troubleshooting frontend issues, or to track the source of database failures that originate from bad browser requests. Full-stack visibility gives you the insight you need to pinpoint and resolve incidents quickly.

Integrate Datadog Compliance Monitoring with your AWS Well-Architected workloads

Many of our customers rely on the Amazon Web Services (AWS) Well-Architected Framework as a guide to build safe, secure, and performant applications in the cloud. AWS offers the Well-Architected Review (WAR) Tool as a centralized way to track and trend adherence to Well-Architected best practices. It allows users to define workloads and answer a set of questions regarding operational excellence, security, reliability, performance efficiency, and cost optimization.

Monitor Windows hosts with Network Performance Monitoring

If you’re running a mix of Windows– and Linux–based hosts in hybrid or cloud environments, network monitoring is especially important—and especially difficult. As network topologies are becoming increasingly distributed and dynamic, you need a quick way to identify connectivity issues across regions, services, and operating systems.

Accelerate security investigations with Datadog Threat Intelligence

Attackers (i.e., threat actors) often reuse techniques or resources, such as IP addresses, hashes, and domains, in multiple attempts to find and exploit vulnerabilities in your systems. Defenders can categorize this data as indicators of compromise (IOCs) and create collections of IOCs in order to look out for potential attacks. These IOC collections are known as threat intelligence.