Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Observabilty for complex systems and related technologies.

Conditional Distributed Tracing

Distributed tracing is generally a binary affair—it's off or on. Either a trace is sampled or, according to a flag, it's not. Span placement is also assumed to be an "always-on" system where spans are always added if the trace is active. For general availability and service-level objectives, this is usually good enough. But when we encounter problems, we need more. In this talk, I'll show you how to "turn up the dial" with detailed diagnostic spans and span events that are inserted using dynamic conditions.

Observability is More Fun With Friends: Stories From OpenTelemetry Collaboration

Panel Guests: Amy Tobey | Equinix Metal, Andrew Hayworth | GitHub, Liz Fong-Jones | Honeycomb, Ted Young | Lightstep The modern open source landscape is hard enough, given the (sometimes) conflicting interests of commercial partners, end-users, and project maintainers. It takes a real, intentional effort to build collaborative relationships across these groups in order to make improvements to projects. In this panel, we'll share stories about what's worked from our involvement in OpenTelemetry as maintainers, community representatives, and end-users.

How To Implement Cloud Observability Like A Pro | Pepperdata

Do traditional on-prem observability techniques translate to the cloud? Many big data enterprises lack observability and thus struggle to manage and understand unprecedented amounts of data in the cloud. A monitoring solution may alert to a problem, but it can’t pinpoint the issue or quickly get to the root cause.

Data Availability Isn't Observability

But it’s better than nothing… Most of the industry is racing to adopt better observability practices, and they’re discovering lots of power in being able to see and measure what their systems are doing. High data availability is better than none, so for the time being, what we get is often impressive. There’s a qualitative difference between observability and data availability, and this post aims to highlight it and orient how we structure our telemetry.

The State of Observability in 2021

Today, we released our second annual Observability Maturity Community Research Findings report. This year-over-year report identifies trends occurring in the observability community that we use to further develop our Observability Maturity Model. Our goal in running this annual report is to understand community perceptions and awareness of observability, how engineering teams are approaching observability, and mapping an observability maturity model that reflects current research findings.

Beyond the network: Next Generation Security and Observability with eBPF - Shaun Crampton, Tigera

Learn how eBPF will bring a richer picture of what's going on in your cluster, without changing your applications. With eBPF we can safely collect information from deep within your applications, wherever they interact with the kernel. For example, collecting detailed socket statistics to root-cause network issues, or pinpointing the precise binary inside a container that made a particular request for your audit trail. This allows for insights into the behavior (and security) of the system that previously would have needed every process to be (manually) instrumented.

Join Us to learn Service Mesh, Observability and Beyond

How can you scale your organization without losing an understanding of your environment? Services mesh is here to help! It gives you the observability of connected services and is easier to adopt than you might think. Come and learn service mesh concepts, best practices, and key challenges.

Ensuring adequate security, observability, & compliance for cloud native applications

Containers, Microservices, and cloud-based applications have revolutionized the way companies build and deliver products globally. This has also changed the attack surface and requires very different security strategies and tools to avoid exposure to sensitive information and other cyber attacks. Regulatory compliance has also evolved making it ever so important for companies to adapt to this new paradigm.