- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
After you have registered your endpoints and assigned team ownership, you can start managing and improving them. Use API Catalog to start activities such as:
You can set up monitors to alert you if something causes your endpoints to perform unexpectedly (like occasionally slow performance), to report outlier data (like extremely slow performance or rare errors), or to achieve metrics beyond a desired threshold (high error rates).
The latest monitor status is displayed in the Explorer where you can see more information about why a monitor is alerting and how to address it. You can also determine if you should launch an investigation by clicking through to view the monitors.
You can also create a monitor on Latency or Error rate directly from API Catalog by clicking + Monitor in the MONITORS column. Read Alerting for additional information about setting up and managing monitor alerts.
Using synthetic API tests, you can set up automated scheduled tests of your endpoints that alert you if the tests fail so you can diagnose and fix the problem.
The API TESTS column on the Explorer page shows you which of your endpoints have tests and if any of them are failing. If tests are failing, the test status to investigate further.
Click + API Test in the API TESTS column to create another synthetic API test for this endpoint. Read the documentation about Synthetic HTTP API Tests for more information about setting up tests.
Powered by Datadog Application Security Management (ASM), the SECURITY SIGNALS column in the Explorer shows you if ASM has detected threats to the services associated with your endpoints. Sort the table by this column to see which of your endpoints are most affected. Click View in ASM to investigate and address the threats and vulnerabilities in your code or your upstream dependencies.