article thumbnail

Kubernetes in the wild report 2023

Dynatrace

Findings provide insights into Kubernetes practitioners’ infrastructure preferences and how they use advanced Kubernetes platform technologies. As Kubernetes adoption increases and it continues to advance technologically, Kubernetes has emerged as the “operating system” of the cloud. Kubernetes moved to the cloud in 2022.

article thumbnail

Path to NoOps part 2: How infrastructure as code makes cloud automation attainable—and repeatable—at scale

Dynatrace

Infrastructure as code is a way to automate infrastructure provisioning and management. In this blog, I explore how Dynatrace has made cloud automation attainable—and repeatable—at scale by embracing the principles of infrastructure as code. Infrastructure-as-code. But how does it work in practice?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is container orchestration?

Dynatrace

Containers enable developers to package microservices or applications with the libraries, configuration files, and dependencies needed to run on any infrastructure, regardless of the target system environment. This means organizations are increasingly using Kubernetes not just for running applications, but also as an operating system.

article thumbnail

Three ways to optimize open source contributions

Dynatrace

The figures speak for themselves: 80% of organizations increased their OSS use in 2022. Especially those operating in critical infrastructure sectors such as oil and gas, telecommunications, and energy. However, open source is not a panacea. These projects provide a range of proven benefits.

article thumbnail

What is vulnerability management? And why runtime vulnerability detection makes the difference

Dynatrace

Vulnerability management is an essential part of securing IT operations. But managing the breadth of the vulnerabilities that can put your systems at risk is challenging. To understand why, and why runtime vulnerability detection is crucial, it helps to understand more about security vulnerabilities. What is a security vulnerability?

Traffic 165
article thumbnail

What is cloud application security?

Dynatrace

If your app runs in a public cloud, such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP), the provider secures the infrastructure, while you’re responsible for security measures within applications and configurations. Likewise, attacks on open source libraries have increased.

Cloud 178
article thumbnail

Container security: What it is, why it’s tricky, and how to do it right

Dynatrace

They predicted this figure would jump to 75% by 2022. These products see systems from the “outside” perspective—which is to say, the attacker’s perspective. Harden the host operating system. Consider using one of the many good secrets management systems that are commercially available.