Book Image

Datadog Cloud Monitoring Quick Start Guide

By : Thomas Kurian Theakanath
Book Image

Datadog Cloud Monitoring Quick Start Guide

By: Thomas Kurian Theakanath

Overview of this book

Datadog is an essential cloud monitoring and operational analytics tool which enables the monitoring of servers, virtual machines, containers, databases, third-party tools, and application services. IT and DevOps teams can easily leverage Datadog to monitor infrastructure and cloud services, and this book will show you how. The book starts by describing basic monitoring concepts and types of monitoring that are rolled out in a large-scale IT production engineering environment. Moving on, the book covers how standard monitoring features are implemented on the Datadog platform and how they can be rolled out in a real-world production environment. As you advance, you'll discover how Datadog is integrated with popular software components that are used to build cloud platforms. The book also provides details on how to use monitoring standards such as Java Management Extensions (JMX) and StatsD to extend the Datadog platform. Finally, you'll get to grips with monitoring fundamentals, learn how monitoring can be rolled out using Datadog proactively, and find out how to extend and customize the Datadog platform. By the end of this Datadog book, you will have gained the skills needed to monitor your cloud infrastructure and the software applications running on it using Datadog.
Table of Contents (19 chapters)
1
Section 1: Getting Started with Datadog
9
Section 2: Extending Datadog
14
Section 3: Advanced Monitoring

Summary

Account and user management is an administrative task and regular users will not get into it except for tasks such as creating application keys. The multi-organizations feature can be used to partition the account into logical units, and we looked at sample scenarios where they are useful. Datadog supports industry-standard SSO options using SAML and we learned how to implement those. There are multiple methods available for programmatic access and the primary mechanism is using a key pair, and we went over the steps for generating them. Fine-grained access to Datadog for a user can be implemented using custom user roles and we learned the steps to configure those for a user.

This is the last chapter in the first part of the book, which provided an overview of monitoring in general and an introduction to Datadog and getting started with it in particular. In the subsequent parts and chapters of the book, we will discuss how monitoring features are implemented and used in...