Datadog’s Report Finds Major Growth of Container-Based Serverless Platforms

Datadog, announced the results of its annual State of Serverless report. The 2023 report—which analyzes telemetry across Datadog’s global customer base—found that the serverless ecosystem continues to grow and evolve, particularly as organizations extend their use of container-based applications hosted in serverless environments. As of this year, more than 70% of Datadog’s AWS customers, 60% of Google Cloud customers and almost 50% of Azure customers are using one or more serverless solutions.

While FaaS (Function-as-a-Service) such as AWS Lambda remained the most common type of workload in 2023, the growth of container-based serverless platforms is outpacing overall serverless growth in each major cloud. Azure saw the largest spike in container-based serverless platform adoption with 76% growth year-over-year. Container-based serverless compute platforms have grown more popular because they simplify serverless adoption and migration. This trend in the major clouds reflects that organizations are viewing serverless as a mainstay and identifying valuable use cases for it outside of traditional FaaS offerings.

“There is significant adoption of serverless technologies across all major clouds. We expect the pace of adoption will only increase as more organizations embrace container-based platforms, which have become the serverless ecosystem’s primary growth driver,” said Yrieix Garnier, VP of Product at Datadog. “With more serverless solutions available across and within cloud platforms, serverless can now meet a greater variety of use cases. We are also seeing serverless in the general infrastructure and architectural best practices at organizations, which speaks to the staying power of serverless technologies.”

For more information visit the website here.

The State of Serverless report is available now. For the full results, please visit:

Related News:

Datadog Launches Flex Logs, a New Tier for Log Management

Datadog Expands Application Security Capabilities Uncovering Vulnerabilities