Shows a complete snapshot of the JVM/CLR at moment of event
Decompiled code and variable state retrieved from the Variable Store
Variables are captured across the entire call stack - 10 levels deep
DEBUG-logs captured from JVM/CLR memory without reliance on disk IO
Host / container state - CPU, IO, GC, Heap and more...
Links to snapshots are available in dashboards, CI/CD reports, logs and APM
AES Encryption. PII Redaction. Access Controls.
256-bit AES Encryption
All source code and variable state collected is privately encrypted using a 256-bit AES Encryption key before leaving the production node. Only you have access to secret encryption keys which are not stored by OverOps.
OverOps redacts PII variable data before it leaves the user environment. Variable state is redacted based on configurable variable value patterns and code symbology: variable, field and class names. Designed for PCI and HIPAA-compliant organizations.
The SaaS architecture enables you to use our high availability and secure AWS-powered infrastructure. All collected sensitive data can be stored on-premises.