logoalt Hacker News

rbanffyyesterday at 9:27 AM1 replyview on HN

> once a proprietary vendor gets in the stack, evicting them is going to be a project

Only if the application is poorly architected. The border between the app and the service should be clearly defined and easy to change. That’s true for core services as well as things like log and metrics collection.


Replies

aitchnyuyesterday at 10:19 AM

Datadog libraries encourage you to enrich the telemetry with context like "trying to get payment" etc. Should we avoid it completely or can we abstract it away or ask an LLM to do the tedious task?