Distributed tracing system.
🔗 Visiter ZipkinDescription
Distributed tracing system.
💬 Notre avis
Zipkin est un outil de traçage distribué qui permet de surveiller et d'analyser les performances des applications microservices. Si tu cherches à comprendre où se situent les goulets d'étranglement dans tes services, Zipkin te fournit des outils pratiques pour tracer les requêtes à travers les différents services. C'est particulièrement utile quand tu as une architecture complexe, car il te permet de visualiser le flux des données. Cependant, il faut reconnaître que la prise en main peut être un peu ardue pour les débutants. En plus, Zipkin est moins connu que certains de ses concurrents comme Jaeger ou OpenTracing, ce qui peut poser des problèmes de support ou de documentation à certains moments. Un autre point à garder en tête, c'est que bien que Zipkin soit open source, la mise en place peut demander du temps et des ressources, surtout si tu n'es pas familier avec les systèmes de traçage. Les développeurs qui cherchent une solution robuste et qui ont déjà une certaine expérience avec des outils similaires y trouveront leur compte, mais les novices risquent de se sentir un peu perdus. Au final, c'est un bon choix pour les équipes techniques qui cherchent à optimiser leurs applications, à condition d'être prêts à investir du temps dans l'apprentissage. <!-- ai-reviewed -->
🤖 Fiche enrichie
Points positifs
Open source
Prise en charge des microservices
Visualisation des performances
Points négatifs
Prise en main difficile pour les débutants
Moins de documentation que certains concurrents
🔗 Sites similaires
Ganglia
A scalable distributed monitoring system for high-performance computing systems such as clusters and grids.
Graphite
Scalable realtime graphing.
IOpipe (c)
Application performance monitoring for Amazon Lambda.
SkyWalking
Application performance monitor tool for distributed systems, especially designed for microservices, cloud native and container-based (Docker, K8s, Mesos) architectures.
Tor Bulk Exit List
CollecTor, your friendly data-collecting service in the Tor network. CollecTor fetches data from various nodes and services in the public Tor network and makes it available to the world. If you're doing research on the Tor network, or if you're developing an application that uses Tor network data, this is your place to start. [TOR Node List](https://www.dan.me.uk/tornodes) / [DNS Blacklists](https://www.dan.me.uk/dnsbl) / [Tor Node List](http://torstatus.blutmagie.de/)
TOR Node List
TOR Node List
Project Honey Pot
Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.
MISP - Open Source Threat Intelligence Platform
MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators. A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information. The MISP project includes software, common libraries ([taxonomies](https://www.misp-project.org/t
Gophish
An Open-Source Phishing Framework.
Portswigger
PortSwigger offers tools for web application security, testing & scanning. Choose from a wide range of security tools & identify the very latest vulnerabilities.
ModSecurity
ModSecurity is a toolkit for real-time web application monitoring, logging, and access control.
sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
💬 Commentaires
Aucun commentaire pour le moment. Soyez le premier ! 🎯