Book Image

Datadog Cloud Monitoring Quick Start Guide

By : Thomas Kurian Theakanath
Book Image

Datadog Cloud Monitoring Quick Start Guide

By: Thomas Kurian Theakanath

Overview of this book

Datadog is an essential cloud monitoring and operational analytics tool which enables the monitoring of servers, virtual machines, containers, databases, third-party tools, and application services. IT and DevOps teams can easily leverage Datadog to monitor infrastructure and cloud services, and this book will show you how. The book starts by describing basic monitoring concepts and types of monitoring that are rolled out in a large-scale IT production engineering environment. Moving on, the book covers how standard monitoring features are implemented on the Datadog platform and how they can be rolled out in a real-world production environment. As you advance, you'll discover how Datadog is integrated with popular software components that are used to build cloud platforms. The book also provides details on how to use monitoring standards such as Java Management Extensions (JMX) and StatsD to extend the Datadog platform. Finally, you'll get to grips with monitoring fundamentals, learn how monitoring can be rolled out using Datadog proactively, and find out how to extend and customize the Datadog platform. By the end of this Datadog book, you will have gained the skills needed to monitor your cloud infrastructure and the software applications running on it using Datadog.
Table of Contents (19 chapters)
Section 1: Getting Started with Datadog
Section 2: Extending Datadog
Section 3: Advanced Monitoring

Security monitoring

Cybersecurity is a far more important and essential area to cover in the cloud environment because the application needs to be accessed via the internet and, in most cases, the application itself is hosted in a public cloud. The security of running an application in your own data center and making it accessible only in your private network is no longer an option. The infrastructure and the applications that are exposed to external attacks should be protected and hardened. There is an ecosystem of software applications and services addressing a plethora of cybersecurity issues.

Another aspect is the requirement of meeting security and privacy and compliance standards for doing business, especially if the application is catering to the healthcare and financial industries. Compliance requirements are dictated by laws applicable in the jurisdiction of doing business, and security standards are demanded by customers. Compliance requirements are usually audited by...