Fault Tolerant Distributed Tracing with Apache Kafka and Jaeger

Using Jaeger tracing, I’ve been able to answer an important question that nearly every Apache Kafka project that I’ve worked on posed: how is data flowing through my distributed system? I’ve started writing about this on the Object Partners blog here and now I’m writing about what should be your next question: now that I’m relying on Jaeger to trace how data is flowing through my distributed system, what if Jaeger goes down?

If you want to answer that question and learn how you can use Kafka to make your Jaeger tracing solution more robust read my latest post on the Confluent blog here: https://www.confluent.io/blog/fault-tolerance-distributed-systems-tracing-with-apache-kafka-jaeger.

About the Author

Aaron Burk profile.

Aaron Burk

Director of Technology

Aaron Burk is a Director of Technology at Object Partners/Improving located in Minneapolis, MN. He is passionate about building and designing highly scalable and available distributed software systems and is currently working with technologies like Java, Apache Kafka, Spring Boot, Kubernetes, Terraform, to name a few.

Leave a Reply

Your email address will not be published.

Related Blog Posts
Natively Compiled Java on Google App Engine
Google App Engine is a platform-as-a-service product that is marketed as a way to get your applications into the cloud without necessarily knowing all of the infrastructure bits and pieces to do so. Google App […]
Building Better Data Visualization Experiences: Part 2 of 2
If you don't have a Ph.D. in data science, the raw data might be difficult to comprehend. This is where data visualization comes in.
Unleashing Feature Flags onto Kafka Consumers
Feature flags are a tool to strategically enable or disable functionality at runtime. They are often used to drive different user experiences but can also be useful in real-time data systems. In this post, we’ll […]
A security model for developers
Software security is more important than ever, but developing secure applications is more confusing than ever. TLS, mTLS, RBAC, SAML, OAUTH, OWASP, GDPR, SASL, RSA, JWT, cookie, attack vector, DDoS, firewall, VPN, security groups, exploit, […]