Talk given at HashiTalks 2022 by Shai Almog:
Learn how continuous observability helps us go beyond the limits of AMS, Logs and other observability tools. Solve real world problems at scale in production in polyglot highly distributed environments such as Nomad, K8S etc. with this free solution.
36. Management
Server sends
request to the
agent
Developer
Management Server
The developer uses
Lightrun's IDE plugin
to add an action in
example.java line 100
How it Works
1
2
37. Management
Server sends
request to the
agent
Agent inserts
the actions
at the specific
location at
runtime
Developer
Management Server
Service Running with
Lightrun’s Agent
The developer uses
Lightrun's IDE plugin
to add an action in
example.java line 100
How it Works
1
2
3
38. Management
Server sends
request to the
agent
Agent inserts
the actions
at the specific
location at
runtime
The data is
transferred to
the developer’s
IDE, through the
Server
Developer
Management Server
Service Running with
Lightrun’s Agent
The developer uses
Lightrun's IDE plugin
to add an action in
example.java line 100
How it Works
1
2
3
4
113. Summary
Stability
Inserted Actions are emulated in a
dedicated Sandbox to validate there are
no side effects of the original flow and
state of the process
114. Summary
Stability
Inserted Actions are emulated in a
dedicated Sandbox to validate there are
no side effects of the original flow and
state of the process
Security
Authorization and authentication,
integration with common IDPs
115. Summary
Stability
Inserted Actions are emulated in a
dedicated Sandbox to validate there are
no side effects of the original flow and
state of the process
Security
Authorization and authentication,
integration with common IDPs
Privacy
PII redaction and blacklisting of files /
methods / members
116. Summary
Stability
Inserted Actions are emulated in a
dedicated Sandbox to validate there are
no side effects of the original flow and
state of the process
Security
Authorization and authentication,
integration with common IDPs
Privacy
PII redaction and blacklisting of files /
methods / members
Footprint
CPU footprint is negligible.
Memory and network footprints are
capped and configurable
117. Summary
Stability
Inserted Actions are emulated in a
dedicated Sandbox to validate there are
no side effects of the original flow and
state of the process
Security
Authorization and authentication,
integration with common IDPs
Privacy
PII redaction and blacklisting of files /
methods / members
Footprint
CPU footprint is negligible.
Memory and network footprints are
capped and configurable
Environment agnostic
Operates on-prem / cloud,
microservices, serverless