Our next-gen architecture is built to help you make sense of your ever-growing data Watch a 4-min demo video!

All Articles

What is Distributed Tracing? Everything You Need to Know
7 min

What is Distributed Tracing? Everything You Need to Know

Tracing, or more specifically distributed tracing or distributed request tracing, is the ability to follow a request through a homegrown software system, joining the dots between…

An Introduction to Kubernetes Observability
7 min

An Introduction to Kubernetes Observability

If your organization is embracing cloud-native practices, then breaking systems into smaller components or services and moving those services to containers is an essential step in…

Analyzing Test Results Through Your Logs & How to Choose Which Automation Tests to Implement
8 min

Analyzing Test Results Through Your Logs & How to Choose Which Automation Tests to Implement

According to the 2021 test automation report, more than 40% of companies want to expand and invest their resources in test automation. While this doesn’t mean…

Java Debugging: Using Tracing To Debug Applications
9 min

Java Debugging: Using Tracing To Debug Applications

Write enough programs, and you’ll agree that it’s impossible to write an exception-free program, at least in the first go. Java debugging is a major part…

Cloud Configuration Drift: What Is It and How to Mitigate it
10 min

Cloud Configuration Drift: What Is It and How to Mitigate it

More organizations than ever run on Infrastructure-as-Code cloud environments. While migration brings unparalleled scale and flexibility advantages, there are also unique security and ops issues many…

June 2022 Platform Updates
3 min

June 2022 Platform Updates

Our team has been hard at work this month to introduce 2 new parsing rules, DataMap improvements, updated tracing visualizations for SLA monitoring & more. Get…

How do Observability and Security Work Together?
9 min

How do Observability and Security Work Together?

There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro…

Kubernetes Security Best Practices
8 min

Kubernetes Security Best Practices

As the container orchestration platform of choice for many enterprises, Kubernetes (or K8s, as it’s often written) is an obvious target for cybercriminals. In its early…

Keeping IaC Secure: Common Security Risks in Infrastructure as Code
10 min

Keeping IaC Secure: Common Security Risks in Infrastructure as Code

What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of putting the provisioning and configuring your cloud resources into machine-readable code. …

Your data is telling yesterday’s story —
Find out what it can tell you today.