Book Image

Datadog Cloud Monitoring Quick Start Guide

By : Thomas Kurian Theakanath
Book Image

Datadog Cloud Monitoring Quick Start Guide

By: Thomas Kurian Theakanath

Overview of this book

Datadog is an essential cloud monitoring and operational analytics tool which enables the monitoring of servers, virtual machines, containers, databases, third-party tools, and application services. IT and DevOps teams can easily leverage Datadog to monitor infrastructure and cloud services, and this book will show you how. The book starts by describing basic monitoring concepts and types of monitoring that are rolled out in a large-scale IT production engineering environment. Moving on, the book covers how standard monitoring features are implemented on the Datadog platform and how they can be rolled out in a real-world production environment. As you advance, you'll discover how Datadog is integrated with popular software components that are used to build cloud platforms. The book also provides details on how to use monitoring standards such as Java Management Extensions (JMX) and StatsD to extend the Datadog platform. Finally, you'll get to grips with monitoring fundamentals, learn how monitoring can be rolled out using Datadog proactively, and find out how to extend and customize the Datadog platform. By the end of this Datadog book, you will have gained the skills needed to monitor your cloud infrastructure and the software applications running on it using Datadog.
Table of Contents (19 chapters)
Section 1: Getting Started with Datadog
Section 2: Extending Datadog
Section 3: Advanced Monitoring

Best practices

Here are some of the best practices related to managing accounts and users:

  • Consider creating multiple organizations for isolating production monitoring from monitoring rolled out on non-production infrastructure and various monitoring environments for developing and testing new monitoring features. It will keep the production monitoring clean and safe from any inadvertent changes.
  • Create custom user roles for use in production monitoring. Usage of predefined user roles could be more permissive than is required for the user. Always use the policy of least-needed permissions, and remember that monitoring is mostly read-only, unless automatic problem resolution is implemented.
  • Roll out SSO for Datadog users to log in.
  • Use major programmatic access authenticated using a service account and not a real user, as real users could leave the company and the deletion of user keys can break your programs.