article thumbnail

Migrating Critical Traffic At Scale with No Downtime?—?Part 2

The Netflix TechBlog

Migrating Critical Traffic At Scale with No Downtime — Part 2 Shyam Gala , Javier Fernandez-Ivern , Anup Rokkam Pratap , Devang Shah Picture yourself enthralled by the latest episode of your beloved Netflix series, delighting in an uninterrupted, high-definition streaming experience. This is where large-scale system migrations come into play.

Traffic 279
article thumbnail

Telltale: Netflix Application Monitoring Simplified

The Netflix TechBlog

Over the years we’ve learned from on-call engineers about the pain points of application monitoring: too many alerts, too many dashboards to scroll through, and too much configuration and maintenance. Our streaming teams need a monitoring system that enables them to quickly diagnose and remediate problems; seconds count!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why Traditional Monitoring Isn’t Enough for Modern Web Applications

Dotcom-Montior

Website and Web Application Monitoring. Web monitoring is a comprehensive term that describes the activity of testing a website or web application for its availability and performance. Users who rely on the websites for their fundamental needs or entertainment will not tolerate even a few seconds delay. HTTP Monitoring.

article thumbnail

Netflix at AWS re:Invent 2019

The Netflix TechBlog

Netflix shares how Amazon EC2 Auto Scaling allows its infrastructure to automatically adapt to changing traffic patterns in order to keep its audience entertained and its costs on target. By watching applications for anomalous actions, security and operations teams can monitor unusual and erroneous behavior. Wednesday?—?December

AWS 100
article thumbnail

Netflix at AWS re:Invent 2019

The Netflix TechBlog

Netflix shares how Amazon EC2 Auto Scaling allows its infrastructure to automatically adapt to changing traffic patterns in order to keep its audience entertained and its costs on target. By watching applications for anomalous actions, security and operations teams can monitor unusual and erroneous behavior. Wednesday?—?December

AWS 100
article thumbnail

Understanding What Kubernetes Is Used For: The Key to Cloud-Native Efficiency

Percona

Applications can be horizontally scaled with Kubernetes by adding or deleting containers based on resource allocation and incoming traffic demands. It distributes the load among containers and nodes automatically, ensuring that your application can handle any spike in traffic without the need for manual intervention from an IT staff.

article thumbnail

What is web application security? Everything you need to know.

Dynatrace

Examples range from online banking to personal entertainment delivery and e-commerce. Web Application Firewall (WAF) helps protect a web application against malicious HTTP traffic. The most common web traffic transforms implement URL encryption, cookie signing, and anti-CSRF tokens to block CSRF attacks.