Join us

ContentUpdates and recent posts about Grafana Tempo..
Link
@devopslinks shared a link, 5 days, 18 hours ago
FAUN.dev()

Chinese Vulnerability Database: CNVD vs CNNVD Analysis

Investigation profilesCNNVDandCNVDechoCVE. They reveal manual errors and poor machine-readability. China’s July 2021RMSVmandates 48-hour reporting and bans pre-patch disclosure. Mapping gaps exist. The databases published about1.4kentries ahead ofCVE, with lead times measured in months... read more  

Chinese Vulnerability Database: CNVD vs CNNVD Analysis
Link
@devopslinks shared a link, 5 days, 18 hours ago
FAUN.dev()

Please stop externalizing your costs directly into my face

SourceHut spent20–100%of weekly time mitigating hyper‑aggressive LLM crawlers. That work caused dozens of short outages and delayed core projects. The crawlers ignorerobots.txt. They hit costly endpoints likegit blame. They scan full git logs and commits. They rotate randomUser‑Agentsand thousands o.. read more  

Link
@devopslinks shared a link, 5 days, 18 hours ago
FAUN.dev()

Building a Least-Privilege AI Agent Gateway for Infrastructure Automation with MCP, OPA, and Ephemeral Runners

Introduces anAI Agent Gateway. It mediates agent requests, validates intent, enforcespolicy-as-code, and isolates execution inephemeral runners. Agents discover tools viaMCP. They submitJSON-RPCcalls and receiveOPAdecisions. Jobs queue and run in short-lived namespaces. Each run carries plan hashes,.. read more  

Building a Least-Privilege AI Agent Gateway for Infrastructure Automation with MCP, OPA, and Ephemeral Runners
Link
@devopslinks shared a link, 5 days, 18 hours ago
FAUN.dev()

The hunt for truly zero-CVE container images

Chainguard's Factory 2.0 andDriftlessAFrebuild images from source on upstream changes. They produce 2,000+ minimalzero‑CVEimages. Each image includes anSBOMand a cryptographicsignature. Docker'sDHIbuilds onDebianandAlpine. It mirrors Debian'sno‑DSAtriage intoVEX. It also suppresses real CVEs until D.. read more  

 Activity
@secuodsoft started using tool MySQL , 1 week ago.
 Activity
@secuodsoft started using tool Kubernetes , 1 week ago.
 Activity
@secuodsoft started using tool Jenkins , 1 week ago.
 Activity
@secuodsoft started using tool Docker , 1 week ago.
 Activity
@secuodsoft started using tool Python , 1 week ago.
 Activity
@secuodsoft started using tool PHP , 1 week ago.
Grafana Tempo is a distributed tracing backend built for massive scale and low operational overhead. Unlike traditional tracing systems that depend on complex databases, Tempo uses object storage—such as S3, GCS, or Azure Blob Storage—to store trace data, making it highly cost-effective and resilient. Tempo is part of the Grafana observability stack and integrates natively with Grafana, Prometheus, and Loki, enabling unified visualization and correlation across metrics, logs, and traces.

Technically, Tempo supports ingestion from major tracing protocols including Jaeger, Zipkin, OpenCensus, and OpenTelemetry, ensuring easy interoperability. It features TraceQL, a domain-specific query language for traces inspired by PromQL and LogQL, allowing developers to perform targeted searches and complex trace-based analytics. The newer TraceQL Metrics capability even lets users derive metrics directly from trace data, bridging the gap between tracing and performance analysis.

Tempo’s Traces Drilldown UI further enhances usability by providing intuitive, queryless analysis of latency, errors, and performance bottlenecks. Combined with the tempo-cli and tempo-vulture tools, it delivers a full suite for trace collection, verification, and debugging.

Built in Go and following OpenTelemetry standards, Grafana Tempo is ideal for organizations seeking scalable, vendor-neutral distributed tracing to power observability at cloud scale.