Operations | Monitoring | ITSM | DevOps | Cloud

How to Keep Traces for Slow and Failed Requests

Today we are introducing Local Tail-Based sampling in Kamon Telemetry! We are going to tell you all about it in a little bit but before that, let’s take a couple minutes to explore what is sampling, how it is used nowadays, and what motivated us to including local tail sampling in Kamon Telemetry.

Datadog vs. Dynatrace vs. Scout

Application Performance Monitoring is undoubtedly the hottest tool to accelerate any product’s growth in the modern market. The term has grown from a simple performance tracking operation to full-fledged infrastructure, network, and application observability. This evolution has only helped bring more and more growth into products. It is essential to choose the best-suited monitoring solution for your apps since observability involves way too many moving pieces.

Announcing HAProxy 2.5

Register for our live webinar to learn more about this release. HAProxy 2.5 is now available! It adds improvements to a number of areas including better usability around setting variables, more descriptive error reporting and logging, and enhanced HTTP and WebSocket support. The HAProxy Runtime API has expanded its coverage of SSL-related commands and now includes the ability to add and remove CA files and revocation lists on-the-fly.

Monolithic (Legacy) vs. Microservices Application Development

Microservices are becoming increasingly popular and are considered to be the next flexible, scalable, and reliable approach. Without a doubt, many developers are rethinking their application development methods. However, while many have been quick to jump on the microservices bandwagon, it’s not a decision that you should make lightly.

What's new in Sysdig - November 2021

Welcome to a new update of “What’s new in Sysdig.” Happy All Saints’/Souls’ Day! Happy International Pianist Day! Happy Thanksgiving! Happy Diwali! Glad alla helgons dag. The “What’s new in Sysdig” blog has been rotated to a new team, and this month, Peter Andersson is responsible for the publishing. Thanks to Chris Kranz for an excellent job compiling these articles earlier.

Visualizing IoT security metrics with Grafana at Network to Code

As the number of connected gadgets in our homes, offices, and industrial networks continues to grow exponentially, keeping IoT devices secure has become a vital part of our everyday lives. However, our webcams, printers, and smart plugs often lack security features due to their fast time to market, making them particularly vulnerable to attack. And because security metrics themselves can be tricky to assess, tracking IoT device security is increasingly a challenge.