Operations | Monitoring | ITSM | DevOps | Cloud

Datadog

Use Datadog monitors as quality gates for GitHub Actions deployments

With the growing adoption of automated deployment tools, many organizations are releasing code more frequently. As releases increase, it’s important to ensure that you don’t accidentally introduce faulty deployments, which can have wide-ranging impacts on your infrastructure, application, and end-user experience, and can potentially lead to costly rollbacks.

Search your logs efficiently with Datadog Log Management

In any type of organization and at any scale, logs are essential to a comprehensive monitoring stack. They provide granular, point-in-time insights into the health, security, and performance of your whole environment, making them critical for key workflows such as incident response, security investigations, auditing, and performance analysis. Many organizations generate millions (or even billions) of log events across their tech stack every day.

Proactively track, triage, and assign issues with Datadog Case Management

Complex systems require many different monitors to assess the health of their infrastructure and applications, creating a wealth of alerts that can be hard to track. Due to a lack of effective triage processes, many organizations page engineers for every alert that comes in, making it difficult to separate false positives from issues that actually require immediate attention.

Add more context to your logs with Reference Tables

Logs provide valuable information for troubleshooting application performance issues. But as your application scales and generates more logs, sifting through them becomes more difficult. Your logs may not provide enough context or human-readable data for understanding and resolving an issue, or you may need more information to help you interpret the IDs or error codes that application services log by default.

How to deploy the Datadog Agent on Windows with Ansible

When your organization relies on hundreds or thousands of hosts, it can be difficult to ensure that each is equipped with the proper tools and configurations. Configuration management tools like Ansible are designed to help you automatically deploy, manage, and configure hosts across your on-prem and cloud infrastructure. In this post, we’ll show you how to use Ansible to automate the installation of the Datadog Agent on a dynamic inventory of Windows hosts.

Announcing support for monitoring AWS Lambda Function URLs with Datadog

AWS Lambda Function URLs make it even easier to create AWS Lambda functions that can be accessed and triggered by using HTTP/S requests, which is key for building serverless applications that are connected to and invoked from the web. Now you can generate a URL in one click that points to a specified Lambda function. Then, any HTTP/S request that a Function URL receives will trigger the Lambda function it’s assigned to.

More efficient pair programming with Datadog CoScreen

Pair programming is a well-established practice in agile software development. But it can be difficult in remote settings, as most remote collaboration tools don’t accommodate real-time, spontaneous interactivity among participants’ desktop environments. Datadog CoScreen changes that by combining interactive screen sharing and video conferencing in a way that closely mimics in-person collaboration.

Monitor your Azure Arc hybrid infrastructure with Datadog

In today’s modern digital environment, many organizations are architecting their infrastructure and services around a mix of cloud and on-prem solutions. Both cloud and private servers offer unique benefits, and taking a hybrid approach to infrastructure can allow businesses to better meet user demand on a global scale while expanding capabilities, minimizing risk, and keeping services consistent.

Monitor Calico with Datadog

Calico is a versatile networking and security solution that features a plugable dataplane architecture. It supports various technologies, including Iptables, eBPF, Host Network Service (HNS for Windows), and Vector Packet Processing (VPP) for containers, virtual machines, and bare-metal workloads. Users can employ Calico’s network security policies to restrict traffic to and from specific clusters handling customer data and to quickly block malicious IP addresses during external attacks.