Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Datadog Cloud Monitoring Quick Start Guide

You're reading from   Datadog Cloud Monitoring Quick Start Guide Proactively create dashboards, write scripts, manage alerts, and monitor containers using Datadog

Arrow left icon
Product type Paperback
Published in Jun 2021
Publisher Packt
ISBN-13 9781800568730
Length 318 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Thomas Kurian Theakanath Thomas Kurian Theakanath
Author Profile Icon Thomas Kurian Theakanath
Thomas Kurian Theakanath
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Section 1: Getting Started with Datadog
2. Chapter 1: Introduction to Monitoring FREE CHAPTER 3. Chapter 2: Deploying the Datadog Agent 4. Chapter 3: The Datadog Dashboard 5. Chapter 4: Account Management 6. Chapter 5: Metrics, Events, and Tags 7. Chapter 6: Monitoring Infrastructure 8. Chapter 7: Monitors and Alerts 9. Section 2: Extending Datadog
10. Chapter 8: Integrating with Platform Components 11. Chapter 9: Using the Datadog REST API 12. Chapter 10: Working with Monitoring Standards 13. Chapter 11: Integrating with Datadog 14. Section 3: Advanced Monitoring
15. Chapter 12: Monitoring Containers 16. Chapter 13: Managing Logs Using Datadog 17. Chapter 14: Miscellaneous Monitoring Topics 18. Other Books You May Enjoy

Security monitoring

Cybersecurity is a far more important and essential area to cover in the cloud environment because the application needs to be accessed via the internet and, in most cases, the application itself is hosted in a public cloud. The security of running an application in your own data center and making it accessible only in your private network is no longer an option. The infrastructure and the applications that are exposed to external attacks should be protected and hardened. There is an ecosystem of software applications and services addressing a plethora of cybersecurity issues.

Another aspect is the requirement of meeting security and privacy and compliance standards for doing business, especially if the application is catering to the healthcare and financial industries. Compliance requirements are dictated by laws applicable in the jurisdiction of doing business, and security standards are demanded by customers. Compliance requirements are usually audited by...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image