Remove Best Practices Remove Infrastructure Remove Open Source Remove Operating System
article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Protecting IT infrastructure, applications, and data requires that you understand security weaknesses attackers can exploit. NMAP is an example of a well-known open-source network scanner. These can include the configuration of operating system access controls and the use of unnecessary libraries or system services.

article thumbnail

Kubernetes: Challenges for observability platforms

Dynatrace

Nevertheless, there are related components and processes, for example, virtualization infrastructure and storage systems (see image below), that can lead to problems in your Kubernetes infrastructure. Cloud provider/infrastructure layer. Additionally, problems can be caused by changes in the cloud infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Predictive CPU isolation of containers at Netflix

The Netflix TechBlog

We were able to meaningfully improve both the predictability and performance of these containers by taking some of the CPU isolation responsibility away from the operating system and moving towards a data driven solution involving combinatorial optimization and machine learning. Since MIPs are NP-hard, some care needs to be taken.

Cache 251
article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. Without further ado, let’s start with the OS settings.

article thumbnail

Container security: What it is, why it’s tricky, and how to do it right

Dynatrace

Application developers commonly leverage open-source software when building containerized applications. In fact, the market research firm Forrester says that the average container image is comprised of 70% open-source software.[1] 1] And unfortunately, open-source software is often fraught with security vulnerabilities.

article thumbnail

Weighing a microservices approach means covering all architecture bases

Dynatrace

Microservices development is intrinsically optimized for continuous integration/continuous deployment ( CI/CD ) processes that apply agile development best practices for the rapid delivery of reliable code. VMs require their own operating system and take up additional resources. Systems monitoring and alerting.

article thumbnail

Everything as Code

Dynatrace

And, this is even more apparent due to the ever-increasing infrastructure complexity enterprises are dealing with. Treating these different processes as code will ensure that best practices are followed. On-demand infrastructure: The ability to deploy infrastructure whenever it’s required.

Code 107