9th February 2026

SigNoz

Hey buddy,

I was poking around with SigNoz yesterday – this open-source observability platform that pulls together logs, traces, and metrics into a clean dashboard, the kind you spin up locally when you don't want Datadog bills sneaking up on you. Found this page  useful when their official Docker images were choking on M3 ARM quirks. Had a client microservice stack acting up – needed to capture 48 hours of distributed traces across 12 Node.js services (auth, payments, notifications), correlate slow SQL queries with 502s, and visualize ClickHouse query latency spikes, all running containerized on my M3 Max Mac Studio (Sequoia 15.2.1, clean Docker setup – no Colima cruft or betas). Native macOS client for the UI supposedly. Downloaded the DMG around evening, dragged SigNoz.app to Applications.

First go at launch. Dock icon bounced solid at 20:15:32 – dashboard loader hit "Connecting to otel-collector..." at 7% – then vanished. Smooth ghost, no spinning wheel. Right-click > Open triggered Gatekeeper's familiar "SigNoz can't be opened because Apple can't verify the developer" banner. Clicked through, config pane flickered (ClickHouse endpoint half-filled), trace explorer sketched empty graph, PID 8921 terminated silent. Activity Monitor nailed the quick spawn/kill. Tried Launchpad next, killall Dock; killall SystemUIServer, even re-mounted DMG fresh. Identical 1.2-second flicker-death loop every time. Console filtered "SigNoz" or "securityd" grumbled "assessment failed: unsigned OpenTelemetry binding" without a deep trace. Wasted 28 minutes chasing phantoms: redownloaded archive (SHA matched), cleared Docker socket caches if any (rm -rf ~/Library/Containers/com.docker.docker), rebooted thinking port conflict. Pure distraction theater – should've logged live from the start.

Then it hit me: deeper than stock Gatekeeper fuss. Sequoia's runtime protection eyes observability tools like hawks – anything binding gRPC/OTLP over native sockets or probing Docker daemon via unix:///var/run/docker.sock gets axed mid-handshake on M3 because unsigned collectors mimic persistence implants. SigNoz client embeds OpenTelemetry Go bindings that map shared memory for trace spans during first collector ping, trips amfid when the metrics exporter probes system counters. No panic crash – macOS just evaporates politely. Kicked off log stream --predicate 'subsystem == "com.apple.securityd" OR process == "SigNoz"' --info on launch. Jackpot – "reject-unsigned-framework /Frameworks/OTLPNative.dylib" and "deny unix socket: quarantine runtime evaluation." Intel Sonoma boxes ran post-right-click (spare 2022 Mac Mini confirmed); M3 Max now inspects every gRPC frame. Apple's

runtime protection details

tags monitoring clients explicitly.

What truly lit the traces? Terminal method, precise. Quarantine wipe upfront: xattr -r -d com.apple.quarantine /Applications/SigNoz.app – breezed silent despite xattr -l feigning clean (DMG stealth flags). Relaunch stuck – dashboard loaded, pointed otel-collector at localhost:4317, client services piped traces clean. Live graph spiked on payments service 502s correlating to DB pool exhaustion. But metrics export? "Cannot bind ClickHouse temp spans to /private/var/folders – access denied." TCC throttling. System Settings > Privacy & Security > Full Disk Access – padlock unlock, "+" bundle drag, green switch. Developer Tools access too (gRPC socket priority). Files & Folders for ~/Projects/Microservices and Docker volumes. Non-optional: total quit (pkill -f SigNoz), relaunch forced – TCC refreshes sluggish. Full stack traced: 48hr spans indexed 2.1M events, ClickHouse queries averaged 180ms with p99 at 2.4s outliers flagged, flame graphs pinpointed auth JWT validation bottleneck. Hotspot dashboard idled 1.7% CPU.

App Store monitoring suites like New Relic sandbox too tight. SigNoz's native OTLP shines for local stacks.

Post-setup snag: sleep/wake dropped collector reconnect till killall launchservicesd. Updates nuke scopes sometimes – tccutil reset FullDiskAccess com.signoz.id (ID pulled from mdls -name kMDItemCFBundleIdentifier -raw /Applications/SigNoz.app) resets pinpoint.

My streamlined checklist for telemetry tools you grab next:

xattr -r -d com.apple.quarantine /App.app post-drag ritual.

Full Disk + Developer Tools toggles, full quit/relaunch post-grant.

Live hunt: log stream --predicate 'subsystem == "com.apple.tcc"'.

Socket verify: codesign -dv --deep /App.app.

Client bottlenecks mapped client-ready – payments scaled post-tracing. Zero cloud telemetry costs (all local ClickHouse). Battery held steady too. If service meshes tangle your deploys, grind the Gatekeeper once – SigNoz observes sharp.