Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Debug live production issues with the Datadog Cursor extension

The Datadog Cursor Extension uses the Datadog remote MCP Server to give developers access to Datadog tools and observability data directly from within the Cursor IDE. The Cursor Extension enables you to view live variable values that your logpoints capture during execution, and you can use the Cursor Agent to identify the lines of code responsible for the issue at hand. The Datadog Cursor Extension is now available in Preview.

Taming Your Dynatrace Bill: How to Cut Observability Costs, Not Visibility

Dynatrace is a powerhouse for application performance monitoring and business analytics. But for many organizations, its power comes with a significant challenge: as applications scale across complex hybrid environments and diverse tech stacks, the sheer volume and variety of logs, metrics, and traces sent to the platform can explode, leading to staggering and unpredictable costs.

Zero Trust Starts with Zero Blind Spots

Zero Trust is more than a buzzword in today’s cybersecurity playbook, it’s a strategic imperative. Federal agencies, defense operations, and civilian infrastructure providers are all under mounting pressure to deploy Zero Trust Architecture (ZTA) frameworks that are not only compliant but truly effective. But there’s a problem: Zero Trust can only succeed if it’s built on real-time, actionable insight. That means eliminating blind spots.

Throughput Upgrade (With Train Illustrations!)

URLs) receive spiky traffic:. The Healthchecks open-source project includes a fully functional, tested and type-annotated ping handler written in Python. On self-hosted Healthchecks instances, when you send an HTTP request to a ping URL, a Django view collects and validates information from the request, then uses Django ORM to update a Check object in the database and insert a Ping object in the database. This approach is good for tens to low hundreds of requests per second, depending on hardware.