Datadog
Datadog
  • Видео 721
  • Просмотров 5 493 624
Container Monitoring Demo
Datadog Container Monitoring gives you real-time, end-to-end visibility into the health, security, and resource usage of your containerized environments. In this demo, we’ll show you how Datadog measures container health alongside security posture and resource utilization, offering end-to-end monitoring and optimization for your container ecosystem. Try a free 14-day trial at www.datadoghq.com/product/container-monitoring/?
RUclips Chapters:
0:00 Introduction
0:14 Kubernetes Overview Page
1:06 Live Containers
1:45 Watchdog Insights
2:02 Pods View
3:15 CRD Collection
4:01 Container Image Security
4:50 Kubernetes Resource Utilization
5:37 Sign up for a free trial
Просмотров: 101

Видео

Kubernetes Security Fundamentals: Authentication - Part 1
Просмотров 37716 часов назад
In this video we’ll start looking at how Kubernetes handles authentication with a look at Client certificate auth. If you’d like more information please see our security labs post: securitylabs.datadoghq.com/articles/kubernetes-security-fundamentals-part-3/
How IO Connect Partnered with Datadog to Enhance Support for their Datadog Users
Просмотров 9121 час назад
Discover how Gold Tier Partner IO Connect Services partners with Datadog to provide comprehensive MuleSoft integrations to customers. Josh Adams, Director of Sales, explains the dual benefits of their MuleSoft integrations for customers and the dedicated support from Datadog’s development, sales, and marketing teams to qualify and close opportunities together.
How Crest Data Partners with Datadog to Tailor Integrations for Customers
Просмотров 7221 час назад
Discover how Gold Tier Partner Crest Data builds Datadog Marketplace integrations that help customers enhance operational efficiency, system observability, and cloud security. Monica Gavirangaswa, VP of Product and Business Development, highlights the ease of integrating with Datadog's API’s to quickly develop new Marketplace integrations and close partnership with the Technology Business Devel...
How Red Peaks Partners with Datadog to Shorten Sales Cycles
Просмотров 10714 дней назад
Discover how Gold Tier Partner Red Peaks uses Datadog’s advanced correlation capabilities and AI-driven insights to easily tie data from different apps together when building SAP integrations. Co-Founder Ronan Bariou also highlights how building on the Datadog Marketplace streamlines product deployment and provides instant access to Datadog sales support and resources.
Fostering seamless collaboration & system optimisation across Indonesia’s leading ecommerce platform
Просмотров 40321 день назад
Blibli sought a tool for operational excellence that could streamline processes and offer visibility within their micro services architecture. Datadog aligned seamlessly with Blibli’s tech stack and our integrations allowed Blibli to track metrics including Solr, Kafka, Postgres, Nginx and more. Datadog also helps Blibli’s management gain a comprehensive view of system health and performance an...
This Month in Datadog: DASH 2024 recap, featuring LLM Observability, Log Workspaces, and more
Просмотров 92428 дней назад
Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, we’re recapping our flagship conference, DASH. RUclips Chapters: 00:00 This Month in Datadog 00:...
Making Observability Ownership Practical for Every Developer
Просмотров 413Месяц назад
Connor Teague, Greenlight Gabby Luna, Greenligt Greenlight is a fintech company that empowers parents to raise financially smart kids by teaching them how to responsibly earn, spend, save, invest, and build credit with their money. Recently, observability practices diverged between our SREs and engineers, and they began operating without a common monitoring strategy, leading to a slowdown in fe...
Hear how Whoop is using LLM Observability to help expand their AI usage
Просмотров 738Месяц назад
WHOOP Coach is an AI powered bespoke human performance coach that brings bespoke summaries of its members data to them. Coach gives recommendations that are actionable and realistic to help members achieve their goals. As WHOOP continues to teach Coach to get smarter every day, WHOOP leverages Datadog as the observability platform to monitor the health of all its systems. Watch more customer st...
Iterating on Observability: Reproducing Production Errors in Isolation
Просмотров 364Месяц назад
Jeremy Brett, Charter Communications Robert Gladmon, Charter Communications The orchestration required to support Charter’s 32 million customers is expansive. Many teams are involved in the operations of hundreds of microservices in support of dozens of customer-facing applications with data from nearly 100 back-office systems. All of these systems are in constant flux- fixing bugs, adding feat...
Live-Streaming platform Vidio relies on Datadog for real-time visibility & early feedback
Просмотров 325Месяц назад
Vidio.com is an Indonesian live-stream platform that offers a diverse range of content, including live sports, concerts, original series, and more. Ensuring low latency and high-quality streams is vital in the OTT industry due to varied customer behaviours. During major live events, Vidio services up to 4 Terabits per second of media through multiple CDNs for more than 2 million concurrent user...
How Datadog enables FinTech startup, Flip.id, to scale by democratizing access to telemetry data
Просмотров 285Месяц назад
Flip.id is an Indonesian fintech startup that has revolutionized the way people transfer money domestically. Founded in 2015, Flip.id offers a seamless, cost-effective alternative to traditional banking services by allowing users to transfer money between different banks without incurring fees. Datadog helps Flip.id by allowing unlimited user access to telemetry data and democratizes access to ...
How the Google Kubernetes Engine Team Increased Autonomy and Reduced Costs
Просмотров 275Месяц назад
Ayelet Sachto, Google In this talk, Ayelet Sachto will share lessons from Google’s two-year sustainable operations program, which aimed to reduce the cost of Google Kubernetes Engine (GKE) while their fleet increased-without compromising the reliability of their systems. She will show how improving the partnership with critical dev teams enabled them to reduce 45 percent of the team's unactiona...
Scaling ML Serving to 1000s of Models
Просмотров 284Месяц назад
Scaling ML Serving to 1000s of Models
Iterating on Culture: Datadog's Journey Building Remote Configuration
Просмотров 178Месяц назад
Iterating on Culture: Datadog's Journey Building Remote Configuration
Navigating Cost Pressures at Scale with Rivian’s Connected Vehicle Platform
Просмотров 353Месяц назад
Navigating Cost Pressures at Scale with Rivian’s Connected Vehicle Platform
AI and the Future of Software Engineering
Просмотров 567Месяц назад
AI and the Future of Software Engineering
Building Compelling AI Products
Просмотров 180Месяц назад
Building Compelling AI Products
Scaling Observability in the Cloud with 3 FTEs
Просмотров 144Месяц назад
Scaling Observability in the Cloud with 3 FTEs
Introduction to RUM & Session Replay
Просмотров 975Месяц назад
Introduction to RUM & Session Replay
CJ Olive Young’s Journey to Bridging the Gap Between Business Operations and Infrastructure
Просмотров 805Месяц назад
CJ Olive Young’s Journey to Bridging the Gap Between Business Operations and Infrastructure
Automating Through the Red Tape
Просмотров 88Месяц назад
Automating Through the Red Tape
Service Inventories as a Foundation for Vulnerability Management
Просмотров 98Месяц назад
Service Inventories as a Foundation for Vulnerability Management
How SiriusXM Used Readiness Days to Launch its Next-Gen Streaming App to 34 million Subscribers
Просмотров 81Месяц назад
How SiriusXM Used Readiness Days to Launch its Next-Gen Streaming App to 34 million Subscribers
That Time I Accidentally DDoS'd My Company
Просмотров 104Месяц назад
That Time I Accidentally DDoS'd My Company
Modern Web Performance
Просмотров 158Месяц назад
Modern Web Performance
How to Systematically Filter PII from Logs
Просмотров 325Месяц назад
How to Systematically Filter PII from Logs
Detection as Code: Streamlining Security Operations with Terraform
Просмотров 158Месяц назад
Detection as Code: Streamlining Security Operations with Terraform
Lessons from Building HashiCorp’s Internal Platform
Просмотров 127Месяц назад
Lessons from Building HashiCorp’s Internal Platform
Fast Incident Response for Even Faster Food Delivery at iFood
Просмотров 179Месяц назад
Fast Incident Response for Even Faster Food Delivery at iFood

Комментарии

  • @Synth5069
    @Synth5069 2 дня назад

    extremely useful content

  • @PostmarkedRizzo
    @PostmarkedRizzo 4 дня назад

    Brilliant!

  • @mesutoezdil
    @mesutoezdil 7 дней назад

    Thanks for this useful video! Here is the highlights in the video: 🔴 Authn is a key control in K8s sec - Authn verifies if the credentials are valid - It is the first step in the three-step process for requests in a K8s cluster 🔴 K8s uses external authn instead of built-in methods - K8s has a flexible authn model that relies on external authn providers - Client certificate authn is an internal method but not suitable for production clusters 🔴 Client certificate authn is frequently used in K8s clusters - Components of a K8s cluster must authn each other - For example, the Kubelet on a Worker node authn with the K8s API server using a client certificate and a private key 🔴 Client certificate authn is often used to provision the first user for a cluster - It ensures that unauthorized access to files and resources is restricted - If there is no external authn provider, cluster admins can use standard or super administrator certificates to authn the cluster 🔴 The System Masters group is a special group in K8s that bypasses all authn checks - Even if the RBAC system fails completely for authn, access can still be gained with super administrator credentials, but this requires careful handling - Regular users can use client certificates to authn the cluster. K8s provides the API for requesting certificate signing to simplify this process 🔴 Risks of client certificate authn in K8s - When using client certification authn in production clusters, there is a lack of credential management - Credentials created in this way cannot be effectively tracked or managed, which poses security risks 🔴 There are limitations in user credential management when using client certificate authn - The K8s audit log contains info about created credentials when auditing is enabled, but it is not a good way to track users - K8s does not support certificate revocation 🔴 Client certificate authn is valid for most K8s distributions - Client certificate authn is not recommended for regular use but only for emergencies - Hackers who gain access to the API can create valid cluster credentials

  • @jettpilota
    @jettpilota 20 дней назад

    I think the fear of Ai is more condensed to the idea of information not being as readily accessible. I've never had a bad experience with it. And I find it amusing that cyborgs might be released early I to society as a trial. Anyway just a little rumor going around. #aigodtiffanyjett 8🪷( 😶‍🌫️🪽💌💯

    • @jettpilota
      @jettpilota 20 дней назад

      Typo sorry into society. My phones get hacked all the time lately no wonder. 🤔

  • @mahmoudfadaly8074
    @mahmoudfadaly8074 23 дня назад

    best video illustrating kafka on youtube

  • @user-sj6tj2ss4v
    @user-sj6tj2ss4v 29 дней назад

    좋은 내용 잘보고 갑니다!!