The integrated platform for monitoring & security
Observability
End-to-end, simplified visibility into your stack’s health & performance
インフラ
Applications
ログ
セキュリティ
Detect, prioritize, and respond to threats in real-time
Cloud Security
Application Security
Cloud SIEM
Digital Experience
Optimize front-end performance and enhance user experiences
Related Products
Software Delivery
Build, test, secure and ship quality code faster
Service Management
Integrated, streamlined workflows for faster time-to-resolution
AIOps
AI
Monitor and improve model performance. Pinpoint root causes and detect anomalies
AI Observability
Platform Capabilities
Built-in features & integrations that power the Datadog platform
Built-in Features
Workflows & Collaboration
Extensibility
Industry
テクノロジー
Use Case
Looking for Datadog logos?
You can find the logo assets on our press page.
Optimize IAM policies with least-privilege strategies to secure cloud environments and streamline access ...
Learn how to monitor prompt injection attacks and prevent your LLM applications from leaking sensitive data.
Learn how to effectively ingest, verify, and query your usage data to answer key product analytics questions.
Learn best practices for using Scorecards to track your FinOps evolution and report progress to stakeholders ...
We highlight the key takeaways from our 2024 State of Cloud Security study and how Datadog CSM can help.
Learn how healthcare organizations use Sensitive Data Scanner to detect and redact PII.
Learn about the common causes of connection churn—an overload of traffic in your system—and how to monitor and ...
Explore cloud cost optimization tips and see how Datadog can help manage AWS spend.
Learn how alert storms arise in microservices architectures and the steps you can take to mitigate them.
Learn how Datadog uses the Secure by Design approach to develop new features.
Learn how to gain critical insights into your network health and stay ahead of security issues by monitoring ...
See how we manage our own deployments at Datadog with the Service Catalog, CI/CD Visibility, and internal ...
We highlight the key takeaways from our 2024 State of DevSecOps study and how Datadog can help.
Learn how to effectively collect DORA metrics with an eye towards monitoring and improving your software ...
Learn about what to monitor through each step of an ML workflow.
Learn about key metrics and best practices for monitoring the functional performance of ML models to spot ...
Learn how gRPC helped Datadog scale to its current size and what lessons we learned running a large mesh of ...
See the full context of each vulnerability and its impact on your running code.
Increasing software test visibility enables organizations to make data-driven decisions that improve CI. Learn ...
Learn best practices for the design and management of service catalogs, as well as how Datadog Service Catalog ...
Discover how CI/CD best practices can help you proactively address degrading pipelines and improve developer ...
Learn about alert fatigue, its associated risks, and how to take action to prevent it.
Get details on how we detect and notify users about leaked Datadog keys—and learn about best practices for ...
Learn about the differences between the CPU Manager's policies and get recommendations for specifying CPU ...
We highlight the key takeaways from our 2023 State of Cloud Security study and how Datadog CSM can help.
A look into our incident management process, from initial identification and triage through postmortem ...
Learn how to approach chaos engineering experiments with the security of your cloud resources in mind.
Learn about some of the challenges with and recommendations for building sufficient security coverage for your ...
Learn how Datadog CSM helps our internal security, risk, and engineering teams collaborate to continuously ...
Learn about key considerations for setting effective service level objectives.
Learn how to effectively monitor the health and performance of your static web application and its ...
Learn how Windows event logs can help you monitor your environment's security boundaries and provide ...
Learn how monitoring your CDN logs can help you improve network performance and security.
Learn how to collect, monitor, and use Kubernetes events to root cause and troubleshoot problems with your ...
Learn how to maximize visibility into firewall activity with Datadog.
Learn how to develop effective threat models for your system with Datadog Application Security Management.
Learn how you can start developing effective identity and access management controls for your cloud-native ...
Learn how to benchmark your SQL Server workloads and strategize how to migrate them to Azure.
Learn how resources are allocated in Kubernetes environments and get tips for rightsizing your workloads for ...
Learn how to assess emerging vulnerabilities and develop an emergency-response playbook.
Learn best practices for securing application data and getting better visibility into data activity.
Learn how Datadog Continuous Testing can help you implement best practices for verifying application ...
Learn how to implement an effective strategy for keeping cloud-native applications secure.
Learn best practices for securing all the resources and devices connected to either an organization's network ...
Learn best practices for securing the boundaries of your cloud network.
Learn how Audit Trail provides insight into Datadog usage across your organization to help optimize your ...
Learn best practices for configuring your Amazon VPCs to help keep them secure.
Learn how to use flow logs to identify and troubleshoot VPC security threats.
Learn how Datadog's Technical Solutions team uses our own products to enhance their customer support and ...
Learn some key best practices for monitoring your iOS and Android apps.
Learn some best practices for implementing an effective data compliance strategy for your environment.
Learn best practices for customizing the logrotate utility for your applications.
Learn how to apply formulas and functions to your log data to answer 10 common questions about your ...
Learn how to improve Kubernetes security and mitigate legitimate threats to your applications.
Learn best practices for building serverless applications that are secure, reliable, highly performant, and ...
Learn how to design highly scalable and reliable microservice-based serverless applications.
Learn how to create detection rules that enable you to efficiently identify and respond to security threats in ...
Learn how to use automation and interactivity to get more insight from your postmortems.
Learn how Datadog NPM provides you with a complete view of your network's health and performance.
Learn how you can streamline the collection and management of logs from your AWS serverless environments with ...
Learn how to spot signs of security threats in Linux processes.
Learn how Datadog NPM gives you full visibility into your dynamic, containerized environments.
Learn how to use Datadog to plan, execute, and monitor your migration to the cloud.
Learn how Datadog's testing tunnel and private locations support your internal application monitoring and ...
Learn some best practices for shifting testing to earlier stages of development.
A dark launch is a deployment strategy for testing new versions of a service in production. Learn how to get ...
Learn strategies and tools for monitoring complex single-page applications.
Learn how to get the most out of your Microsoft Azure platform logs and use them to secure your applications.
Learn some of the key Kubernetes API server audit logs that can help you detect potential threats to your ...
Learn how to monitor authentication logs across your entire environment to more easily identify security ...
Datadogは、分散したトレースを実際のユーザーデータに自動的にリンクさせ、エンドツーエンドの可視性を提供し、迅速なトラブルシューティングを実現します。
Learn how to promote test maintainability as well as ensure a consistent, reliable user experience for your ...
Learn how to get the most value out of your service level objectives in Datadog by following these best ...
Setting service level objectives for critical user journeys helps organizations understand how they should ...
Learn how you can make browser tests more efficient with our best practices guide.
Learn how Datadog’s log processing pipelines can help you start categorizing your logs for deeper insights.
Learn how to monitor your Google Cloud audit logs for better visibility into GCP security with Datadog.
Set log management policies with your teams to get the most visibility of your logs—with the least resource ...
Learn how to use tags to organize your monitors and streamline alerting-related workflows in Datadog.
Learn how to detect memory management issues with JVM runtime metrics, garbage collection logs, and alerts.
Learn some best practices for collecting and customizing logs from your Node.js applications.
Learn how to properly collect your multi-line logs and get the most out of them.
Learn about several configuration-related issues we encountered while running 40+ Kafka and ZooKeeper ...
Learn how to capture PHP exceptions and use the Monolog library to expand your PHP logging.
Learn how to use these Python logging best practices to debug and optimize your applications.
Use these Java logging tips and best practices to get deeper insight into your Java applications.
Learn how to get more insights into your .NET applications by following these C# logging best practices.
Learn how PagerDuty improved their deployment process by integrating automated metric checks.
Learn how to investigate and resolve issues with PostgreSQL VACUUM processes.
Learn how you can use Datadog to monitor the performance of your serverless applications running on AWS ...
We ran a game day to manually trigger failures in one of our Elasticsearch clusters—here's what happened.
In this post, we'll explain how to set SLAs and monitor service-level metrics over time.
We've been using Consul for about 18 months at Datadog and it's an important part of our production stack. In ...
Learn about the five most common EC2 performance issues, why they occur, how to detect them, and best ...
Learn how to effectively use summary graphs: visualizations that flatten a particular span of time to ...
Tagged metrics let you add infrastructural dimensions to your metrics on the fly—without modifying the way ...
To help you effectively visualize your metrics, this post explores 4 types of timeseries graphs: Line graphs, ...
When discussing OpenStack, correct word choice is essential. In this article we disambiguate host aggregates, ...
Once your monitoring system has notified you of real performance issues that require attention, its next job ...
Automated alerts allow you to spot problems anywhere in your infrastructure, so that you can rapidly identify ...
Collect metrics and classify data so that you can receive meaningful, automated alerts about potential ...
The Go io.reader allows for better control buffering resulting in faster code that uses less memory. Learn ...
Looking for performance tips for Go applications? In this blog, read about one software engineer's quest to ...
Failures are a fact of life. AWS failure just gets more publicity. Instead let's focus on the more interesting ...
In this post we look at the data publicly available about Elastic Compute Units (ECUs) and draw conclusions ...
Performance issues with Amazon Web Services' Elastic Block Storage (EBS) are complex. Learn how to detect and ...
Learn why real time graphs are crucial when it comes to optimizing your stack performance.
Datadogを開始