Monitoring and Security
Overview
As applications grow, they need to be observable in a way that allows a quick overview, while retaining fine-graned information such as application logs even if a part of the application from which the logs come from becomes unresponsive. As developer resources are often limited, relying on third-party tools can be helpful.
This part is organized as follows:
- Traces, Logs, and Metrics discusses different types of data that can be collected from applications to study their behavior.
- LGTM Stack shows how to take the LGTM stack into use. LGTM stack uses Loki for logs, Grafana for visualization, Tempo for traces, and Prometheus for metrics.
- Secure Design and Coding discusses the need for security throughout the software development lifecycle, and introduces a handful of practices that can be used to improve the security of web applications.
- Authentication and Authorization briefly revisits the terms authentication and authorization, and introduces a third-party authentication library.
- Limiting Access to Authenticated Users showcases how to limit access to authenticated users, building on the chat application from the previous part.
- Overarching Project continues with the overarching project, adding authentication and limiting code submissions to only authenticated users.
Finally, at the end of the part, there is a recap and feedback chapter that briefly summarizes the part and asks for feedback on the part.