Operations | Monitoring | ITSM | DevOps | Cloud

APM

The latest News and Information on Application Performance Monitoring and related technologies.

APM & Distributed Tracing in SigNoz

More about SigNoz: SigNoz - Monitor your applications and troubleshoot problems in your deployed applications, an open-source alternative to DataDog, New Relic, etc. Backed by Y Combinator. SigNoz helps developers monitor applications and troubleshoot problems in their deployed applications. SigNoz uses distributed tracing to gain visibility into your software stack. If you need any clarification or find something missing, feel free to raise a GitHub issue with the label documentation or reach out to us at the community slack channel.

Logs Management & Correlating Logs with Traces in SigNoz

More about SigNoz: SigNoz - Monitor your applications and troubleshoot problems in your deployed applications, an open-source alternative to DataDog, New Relic, etc. Backed by Y Combinator. SigNoz helps developers monitor applications and troubleshoot problems in their deployed applications. SigNoz uses distributed tracing to gain visibility into your software stack. If you need any clarification or find something missing, feel free to raise a GitHub issue with the label documentation or reach out to us at the community slack channel.

Monitoring Django Performance with Scout APM: A Step-by-Step Guide

Django is one of the most popular web frameworks for building applications. Its elegance and flexibility make it a favorite among developers, enabling them to craft intricate applications with ease. However, as applications grow in complexity and user traffic grows, the need for active performance monitoring becomes imperative.

New Raygun JS provider v2.27.0 to support performance timing

The popular chromium based browser ecosystem has recently changed how performance metrics can be collected in relation to performance.timing. Before we get into the details, the TLDR is: if you use the Raygun CDN for raygun4js, you’re up to date. If you self-host raygun4js and use Raygun Real User Monitoring, you’ll want to upgrade to version 2.27.0.

10 Best Dynatrace Alternatives [2023 Comparison]

Dynatrace has established itself as a prominent player in the field of application performance management, but given that Dynatrace is an expensive solution aimed at large enterprises, exploring your options is essential. This comprehensive article presents a handpicked selection of the top 10 Dynatrace alternatives, each offering distinct advantages and capabilities.

Innovating with Faster, Safer Experimentation

Experimentation is the key to innovation. But experiments come with risks, not just of failure, but of wasted time, effort, and money. I’ll share the experimental approach that NTT DOCOMO, Japan’s largest wireless provider, takes to build digital products that customers love. I’ll also present examples from experiments we performed on NTT DOCOMO’s Smart-life website that improved the user experience and significantly increased conversion rates. In this session, you’ll learn how to reduce the risk of experiments and iterate faster to improve your services.

Fixing Citrix Issues with eG Enterprise's Automation

Without any ability to self-heal, fixing Citrix usually requires manual intervention to remediate problems. This leads to time spent on mundane tasks managing the care and feeding of Citrix. Automation of these tasks for fixing Citrix provides: In our latest release, eG Enterprise v7.2, we have added new auto-correction and auto-remediation capabilities for Citrix administrators that remove the need for scripting. There are a few issues that can be a cause of constant frustration for admins.

The Darkside of GraphQL

GraphQL is a query language for APIs that provides a powerful and efficient way to query and manipulate data. As powerful and versatile as GraphQL is, its downside is that it can be vulnerable to certain security threats. In this presentation, we will discuss the security vulnerabilities associated with GraphQL, from the basics to more advanced threats, and how to best protect against them. After this presentation, attendees will have a better understanding of security vulnerabilities in GraphQL, as well as an understanding of the steps needed to protect against them.

Container Security Fundamentals - Linux Namespaces (Part 4): The User Namespace

In this video we continue our examination of Linux namespaces by looking at some details of how the user namespace can be used to de-couple the user ID inside a container from the user ID on the host, allowing a container to run as the root user without the risks of being root on the host. To learn more, read our blog on Datadog’s Security Labs site.