datree VS jaeger

Compare datree vs jaeger and see what are their differences.

datree

Prevent Kubernetes misconfigurations from reaching production (again šŸ˜¤ )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our docs: https://hub.datree.io (by datreeio)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
datree jaeger
34 94
6,410 19,499
0.1% 1.1%
5.2 9.7
12 days ago 3 days ago
Go Go
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

datree

Posts with mentions or reviews of datree. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-04.
  • Show HN: Datree (YC W20) ā€“ End-to-End Policy Management for Kubernetes
    2 projects | news.ycombinator.com | 4 Apr 2023
    Hi HN, Iā€™m Shimon, the co-founder of Datree: A policy management solution for Kubernetes. We help DevOps engineers prevent misconfigurations in their Kubernetes by enforcing an organizational policy on their clusters. Engineers can define a custom policy or use one of Datreeā€™s built-in policies, such as NIST/NSA Hardening Guide, EKS Security Best Practices, CIS Benchmark, and more.

    Our website is at https://datree.io and our GitHub is here: https://github.com/datreeio/datree

    This is not the first time I have shown Datree to the HN community: A little over a year ago, I posted here an earlier version of Datree (https://news.ycombinator.com/item?id=28918850). At that time, Datree consisted of a CLI tool to detect Kubernetes misconfigurations during the development process (locally or in the CI/CD), unlike the version I present today in which the enforcement happens in production.

    We built the CLI tool because we detected a big problem among Kubernetes operators: Misconfigurations. Kubernetes is extremely complex and flexible, which makes it very easy to poorly configure it in ways that are not secure. And indeed, we talked to dozens of Kubernetes operators who suffered from various problems, starting with failed audits, all the way to downtime in production, all because of misconfigurations.

    Our solution was simple: Give the developers the means to shift-left security testing during the development process with a CLI tool that can be integrated into the CI/CD. We thought this was the best way to approach the problem: It is easiest to fix misconfigurations in the development process before they are deployed to production, it prevents context-switching and relieves resources from the DevOps team.

    While the CLI tool was very popular among the open-source community (it got over 6000 stars on GitHub), we soon realized that CI/CD enforcement is not enough. As we talked with Datreeā€™s users, we realized we had made a fundamental mistake: We thought of misconfiguration prevention in technical terms rather than organizational terms.

    Indeed, from a technical point of view, it makes sense to shift-left Kubernetes security. But when considering the organizational structure in which it takes place, it simply isnā€™t enough. DevOps engineers told us that they love the shift-left concept, but they simply cannot rely on the goodwill of the engineers to run a CLI tool locally or to monitor all the pipelines leading to production. They need governance, something to help them stay in control of the state of their clusters.

    Moreover, we realized that many companies who use Kubernetes are heavily regulated, and cannot take any chances with their security. Sure, these companies want the engineers to fix misconfigurations during development, but they also want something to make sure that no matter what, their clusters remain misconfiguration-free.

    Based on this understanding, we developed a new version of Datree that sits on the cluster itself (rather than in the CI/CD) and protects the production environment by blocking misconfigured resources with an admission webhook. It has a centralized policy management solution to enable governance, and native monitoring to get real-time insights into the state of your Kubernetes.

    I look forward to hearing your feedback and answering any questions you may have.

  • Is OPA Gatekeeper the best solution for writing policies for k8s clusters?
    14 projects | /r/kubernetes | 10 Nov 2022
  • datreeio/datree: Prevent Kubernetes misconfigurations from reaching production (again šŸ˜¤ )! Datree is a CLI tool to ensure K8s configs follow stability & security best practices as well as your organizationā€™s policies. See our docs: https://hub.datree.io
    1 project | /r/devopsish | 7 Jun 2022
  • Question for the Argo-Verse
    3 projects | /r/argoproj | 12 May 2022
  • How to create a react app with Go support using WebAssembly in under 60 seconds
    4 projects | dev.to | 26 Apr 2022
    Go is a statically typed, compiled programming language designed at Google, it is syntactically similar to C, but with memory safety, garbage collection, structural typing, and CSP-style concurrency. In my case, I needed to run Go for JSON schema validations, in other cases, you might want to perform a CPU-intensive task or use a CLI tool written in Go.
  • Techworld with Nana: Enforce K8s Best Practices with Datree
    1 project | /r/u_datree_io | 26 Apr 2022
  • Gatekeeper vs Kyverno
    3 projects | /r/kubernetes | 18 Apr 2022
    I worked with both of them and from my experience Gatekeeper is more solid and accountable, I even wrote an article about Gatekeeper. Both Gatekeeper and Kyverno require a lot of heavy lifting work. On the one hand, Gatekeeper will probably require more configuration work however the community and the tool itself are more stable than Kyverno. On the other hand, Kyverno policy-as-code capabilities are much easier to use/understand. This way or another, for me using Kyvernoā€™s policy language or Rego for my policies, wasnā€™t such a pleasant experience. I personally believe in GitOps and shifting left so if youā€™re looking for tools I would highly recommend you to review Datree, which is an open-source CLI (Disclaimer: Iā€™m one of the developers at Datree). Datree is a more centralized policy management solution rather than a policy engine. Unlike Kyverno/Gatekeeper Datree was built to help DevOps teams to shift left and practice GitOps by delegating more responsibilities to the developers more efficiently. In practice, Datree already comes with built-in rules and policies along with YAML and schema validation for K8s resources and CRDs such as Argo CRDs. Datreeā€™s policies are written in JSONScheme which is a common solid policy language supported by the community for many years. Additionally, Datreeā€™s CLI also comes with a dashboard app where you can monitor the policies in your organization. You can modify and update your policies, review which policies are being used in practice, and control who can create/delete/update your policies. The major difference is that at the moment, unlike Kyverno/Gatekeeper Datree doesnā€™t provide native policy enforcement in the Kubernetes cluster at the moment but we expect to release this support very soon. At the moment, we provide a way to scan the cluster using a kubectl plugin. Feel free to check it out :)
  • Working with Datreeā€™s Helm Plugin
    2 projects | dev.to | 27 Mar 2022
    $ helm plugin install https://github.com/datreeio/helm-datree Installing helm-datree... https://github.com/datreeio/datree/releases/download/1.0.6/datree-cli_1.0.6_Darwin_x86_64.zip % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 673 100 673 0 0 1439 0 --:--:-- --:--:-- --:--:-- 1469 100 6901k 100 6901k 0 0 1852k 0 0:00:03 0:00:03 --:--:-- 2865k helm-datree is installed. See https://hub.datree.io for help getting started. Installed plugin: datree
  • Adding custom rules in Datree
    1 project | dev.to | 19 Feb 2022
    GitHub
  • Learn from Nana, AWS Hero & CNCF Ambassador, how to enforce K8s best practices with Datree.
    1 project | /r/u_datree_io | 26 Jan 2022

jaeger

Posts with mentions or reviews of jaeger. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-01.
  • Observability with OpenTelemetry, Jaeger and Rails
    1 project | dev.to | 22 Feb 2024
    Jaeger maps the flow of requests and data as they traverse a distributed system. These requests may make calls to multiple services, which may introduce their own delays or errors. https://www.jaegertracing.io/
  • Show HN: An open source performance monitoring tool
    2 projects | news.ycombinator.com | 1 Feb 2024
    As engineers at past startups, we often had to debug slow queries, poor load times, inconsistent errors, etc... While tools like Jaegar [2] helped us inspect server-side performance, we had no way to tie user events to the traces we were inspecting. In other words, although we had an idea of what API route was slow, there wasnā€™t much visibility into the actual bottleneck.

    This is where our performance product comes in: weā€™re rethinking a tracing/performance tool that focuses on bridging the gap between the client and server.

    Whatā€™s unique about our approach is that we lean heavily into creating traces from the frontend. For example, if youā€™re using our Next.js SDK, we automatically connect browser HTTP requests with server-side code execution, all from the perspective of a user. We find this much more powerful because you can understand what part of your frontend codebase causes a given trace to occur. Thereā€™s an example here [3].

    From an instrumentation perspective, weā€™ve built our SDKs on-top of OTel, so you can create custom spans to expand highlight-created traces in server routes that will transparently roll up into the flame graph you see in our UI. You can also send us raw OTel traces and manually set up the client-server connection if you want. [4] Hereā€™s an example of what a trace looks like with a database integration using our Golang GORM SDK, triggered by a frontend GraphQL query [5] [6].

    In terms of how it's built, we continue to rely heavily on ClickHouse as our time-series storage engine. Given that traces require that we also query based on an ID for specific groups of spans (more akin to an OLTP db), weā€™ve leveraged the power of CH materialized views to make these operations efficient (described here [7]).

    To try it out, you can spin up the project with our self hosted docs [8] or use our cloud offering at app.highlight.io. The entire stack runs in docker via a compose file, including an OpenTelemetry collector for data ingestion. Youā€™ll need to point your SDK to export data to it by setting the relevant OTLP endpoint configuration (ie. environment variable OTEL_EXPORTER_OTLP_LOGS_ENDPOINT [9]).

    Overall, weā€™d really appreciate feedback on what weā€™re building here. Weā€™re also all ears if anyone has opinions on what theyā€™d like to see in a product like this!

    [1] https://github.com/highlight/highlight/blob/main/LICENSE

    [2] https://www.jaegertracing.io

    [3] https://app.highlight.io/1383/sessions/COu90Th4Qc3PVYTXbx9Xe...

    [4] https://www.highlight.io/docs/getting-started/native-opentel...

    [5] https://static.highlight.io/assets/docs/gorm.png

    [6] https://github.com/highlight/highlight/blob/1fc9487a676409f1...

    [7] https://highlight.io/blog/clickhouse-materialized-views

    [8] https://www.highlight.io/docs/getting-started/self-host/self...

    [9] https://opentelemetry.io/docs/concepts/sdk-configuration/otl...

  • Kubernetes Ingress Visibility
    2 projects | /r/kubernetes | 10 Dec 2023
    For the request following, something like jeager https://www.jaegertracing.io/, because you are talking more about tracing than necessarily logging. For just monitoring, https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack would be the starting point, then it depends. Nginx gives metrics out of the box, then you can pull in the dashboard like https://grafana.com/grafana/dashboards/14314-kubernetes-nginx-ingress-controller-nextgen-devops-nirvana/ , or full metal with something like service mesh monitoring which would provably fulfil most of the requirements
  • Migrating to OpenTelemetry
    8 projects | news.ycombinator.com | 16 Nov 2023
    Have you checked out Jaeger [1]? It is lightweight enough for a personal project, but featureful enough to really help "turn on the lightbulb" with other engineers to show them the difference between logging/monitoring and tracing.

    [1] https://www.jaegertracing.io/

  • The Road to GraphQL At Enterprise Scale
    6 projects | dev.to | 8 Nov 2023
    From the perspective of the realization of GraphQL infrastructure, the interesting direction is "Finding". How to find the problem? How to find the bottleneck of the system? Distributed Tracing System (DTS) will help answer this question. Distributed tracing is a method of observing requests as they propagate through distributed environments. In our scenario, we have dozens of subgraphs, gateway, and transport layer through which the request goes. We have several tools that can be used to detect the whole lifecycle of the request through the system, e.g. Jaeger, Zipkin or solutions that provided DTS as a part of the solution NewRelic.
  • OpenTelemetry Exporters - Types and Configuration Steps
    5 projects | dev.to | 30 Oct 2023
    Jaeger is an open-source, distributed tracing system that monitors and troubleshoots the flow of requests through complex, microservices-based applications, providing a comprehensive view of system interactions.
  • Fault Tolerance in Distributed Systems: Strategies and Case Studies
    4 projects | dev.to | 18 Oct 2023
    However, ensuring fault tolerance in distributed systems is not at all easy. These systems are complex, with multiple nodes or components working together. A failure in one node can cascade across the system if not addressed timely. Moreover, the inherently distributed nature of these systems can make it challenging to pinpoint the exact location and cause of fault - that is why modern systems rely heavily on distributed tracing solutions pioneered by Google Dapper and widely available now in Jaeger and OpenTracing. But still, understanding and implementing fault tolerance becomes not just about addressing the failure but predicting and mitigating potential risks before they escalate.
  • Observability in Action Part 3: Enhancing Your Codebase with OpenTelemetry
    3 projects | dev.to | 17 Oct 2023
    In this article, we'll use HoneyComb.io as our tracing backend. While there are other tools in the market, some of which can be run on your local machine (e.g., Jaeger), I chose HoneyComb because of their complementary tools that offer improved monitoring of the service and insights into its behavior.
  • Building for Failure
    1 project | dev.to | 2 Oct 2023
    The best way to do this, is with the help of tracing tools such as paid tools such as Honeycomb, or your own instance of the open source Jaeger offering, or perhaps Encore's built in tracing system.
  • Distributed Tracing and OpenTelemetry Guide
    5 projects | dev.to | 28 Sep 2023
    In this example, I will create 3 Node.js services (shipping, notification, and courier) using Amplication, add traces to all services, and show how to analyze trace data using Jaeger.

What are some alternatives?

When comparing datree and jaeger you can also consider the following projects:

KubeArmor - Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).

Sentry - Developer-first error tracking and performance monitoring

polaris - Validation of best practices in your Kubernetes clusters

skywalking - APM, Application Performance Monitoring System

kube-score - Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in your Kubernetes YAML and Charts. Static code analysis for Kubernetes.

prometheus - The Prometheus monitoring system and time series database.

polaris - Shopifyā€™s design system to help us work together to build a great experience for all of our merchants.

signoz - SigNoz is an open-source observability platform native to OpenTelemetry with logs, traces and metrics in a single application. An open-source alternative to DataDog, NewRelic, etc. šŸ”„ šŸ–„. šŸ‘‰ Open source Application Performance Monitoring (APM) & Observability tool

reviewdog - šŸ¶ Automated code review tool integrated with any code analysis tools regardless of programming language

Pinpoint - APM, (Application Performance Management) tool for large-scale distributed systems.

Kyverno - Kubernetes Native Policy Management

fluent-bit - Fast and Lightweight Logs and Metrics processor for Linux, BSD, OSX and Windows