Monitoring and Security

Overview


As applications grow, they need to be observable in a way that allows a quick overview, while retaining fine-graned information such as application logs even if a part of the application from which the logs come from becomes unresponsive. As developer resources are often limited, relying on third-party tools can be helpful.

This part is organized as follows:

  • Traces, Logs, and Metrics discusses different types of data that can be collected from applications to study their behavior.
  • LGTM Stack shows how to take the LGTM stack into use. LGTM stack uses Loki for logs, Grafana for visualization, Tempo for traces, and Prometheus for metrics.
  • Secure Design and Coding discusses the need for security throughout the software development lifecycle, and introduces a handful of practices that can be used to improve the security of web applications.
  • Authentication and Authorization briefly revisits the terms authentication and authorization, and introduces a third-party authentication library.
  • Limiting Access to Authenticated Users showcases how to limit access to authenticated users, building on the chat application from the previous part.
  • Overarching Project continues with the overarching project, adding authentication and limiting code submissions to only authenticated users.

Finally, at the end of the part, there is a recap and feedback chapter that briefly summarizes the part and asks for feedback on the part.