Consul Deployment Patterns: A Brief Overview

Consul, developed by HashiCorp is a multi-purpose solution which primarily provides the following features: ... Service discovery and Service Mesh features with Kubernetes. Secure communication and observability between the services.

Shaping a New Culture with Observability for IT, DevOps and SREs

Shaping a New Culture with Observability for IT, DevOps and SREs. Observability with enterprise IT systems is critical in an age of digital transformation.

Run your favorite Helm Chart using MicroK8s in 5 minutes

Helm is a Kubernetes package manager that helps you find, share, and use software built for Kubernetes. With Helm Charts, you can bundle Kubernetes deployments into a single package you can install by running a single command. At LOGIQ, we use Helm Charts on the regular. One of our favorite Helm Charts is logiq – the same […]

Deploying LOGIQ on K3s using a Helm Chart

We’re huge fans of Helm Charts and the simplicity they bring to complex application deployments on Kubernetes and MicroK8s. We showed you how you could use Helm Charts to deploy LOGIQ on MicroK8s in a previous post. As a follow-up to that article, we’d like to show you how Helm Charts are equally helpful in deploying complex […]

Top Kubernetes Health Metrics You Must Monitor

Kubernetes is one of the most popular choices for container management and automation today. A highly efficient Kubernetes setup generates innumerable new metrics every day, making monitoring cluster health quite challenging. You might find yourself sifting through several different metrics without being entirely sure which ones are the most insightful and warrant utmost attention.  As daunting a […]

Survivorship Bias in Observability

Survivorship Bias in Observability. Learn where survivorship bias factors into app monitoring, with special considerations for microservices and request-driven apps. Ensure you are getting unbiased Observability data and keep your applications ‘flying’. Psychology, performance, and modern app development.

AWS Cloudwatch vs Dashbird

AWS Cloudwatch vs Dashbird. Dashbird serverless observability Take the invocations logs view. With CloudWatch you'd normally see all your invocations in one screen. In this article, we compare the key features between AWS Cloudwatch vs Dashbird to help you decide on the most efficient.

Tracing in Grafana with Tempo and Jaeger

This post talks about enabling distributed tracing in the microservice application. It provides configuration for enabling tracing in deployment manifests. It provides a walkthrough of visualizing tracing in Grafana using Jaeger and Tempo data-sources.

PHP 8: Observability Baked Right In

What the observer API means for PHP 8 and the future of observability. The Datadog PHP tracer couldn’t evolve in the era of PHP 8 without changes to the observability hook first. PHP 8: Observability Baked Right In.

Setting Up AWS CloudWatch Alerts (vs Dashbird Alerts) To Monitor Your Applications

AWS CloudWatch alerts (vs Dashbird Alerts) to Monitoring your Applications. AWS Cloudwatch alerts and Dashbird Alarms, to not miss out on critical info about your serverless app. Monitor AWS resources, services, and apps that run on AWS, as well as in the localized servers.

Lower Your AWS Lambda Bill By increasing Memory Size — Yep!

Lower Your AWS Lambda Bill By increasing Memory Size — Yep! When we specify the memory size for a Lambda function, AWS will allocate CPU proportionally. For example, a 256 MB function will receive twice the processing power of a 128 MB function.

Michelle Noorali on the Service Mesh Interface Spec and Open Service Mesh Project

In this podcast, Michelle Noorali, senior software engineer at Microsoft, sat down with InfoQ podcast co-host Daniel Bryant. Topics discussed included: the service mesh interface (SMI) spec, the open service mesh (OSM) project, and the future of application development on Kubernetes.

Microservice Observability Patterns

Microservice Observability Patterns [Part 2] - Evolutionary Patterns for Solving Observability Problems. Logs are easy to integrate into your application and provide the ability to represent any type of data in the form of strings.

How to Optimize Large Scale Serverless Applications for Operational Excellence

Learn how to optimize large scale Serverless applications for operational excellence. We run through the best approach for operational excellence looking at serverless monitoring strategy, serverless alerting strategy, and security and compliance best practices. 

What Is Cloud Native Observability V. Visibility and Why Is It So Important?

What Is Cloud Native Observability V. Visibility and Why is it So important? Why the shift to cloud-native observability has arrived, and a meaningful definition of what it is, the resulting significance, and implications.

Microservices With Observability on Kubernetes

Microservices with Observability on Kubernetes. Microservices on Kubernetes - A Complete Guide to deployment, logging, distributed tracing, performance, and metrics monitoring including cluster health.

Kubernetes Observability

The ability to identify and troubleshoot an issue in a production system is critical. In this article, we will talk about a couple of tools that can help us understand what’s going on in a production Kubernetes cluster.

Alois Reitbauer on Cloud Native Application Delivery, Keptn, and Observability

In this podcast, Alois Reitbauer sat down with InfoQ podcast co-host Daniel Bryant. Topics discussed included: the goals of the CNCF app delivery SIG; how cloud native continuous delivery tooling like Keptn can help engineers scale development and release processes; and the role of culture change, tooling, and adopting open standards, such as OpenTelemetry, within observability.

Interview With Honeycomb Engineer Chris Toshok: Dogfooding OpenTelemetry

The team decided to do some integration dogfooding by instrumenting our own code with OpenTelemetry alongside existing Beeline instrumentation.

Why Observability Is the Next Big Thing in Security

It's not easy to tell modern security stories to users of legacy security solutions still attached to squeezing some fading security value from network-based perimeter walls.