Remove Best Practices Remove Network Remove Operating System Remove Virtualization
article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. Without further ado, let’s start with the OS settings.

article thumbnail

What Is a Workload in Cloud Computing

Scalegrid

Various forms can take shape when discussing workloads within the realm of cloud computing environments – examples include order management databases, collaboration tools, videoconferencing systems, virtual desktops, and disaster recovery mechanisms. This applies to both virtual machines and container-based deployments.

Cloud 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Vulnerability assessment is the process of identifying, quantifying, and prioritizing the cybersecurity vulnerabilities in a given IT system. The goal of an assessment is to locate weaknesses that can be exploited to compromise systems. NMAP is an example of a well-known open-source network scanner. Identify vulnerabilities.

article thumbnail

Firecracker: lightweight virtualization for serverless applications

The Morning Paper

Firecracker is the virtual machine monitor (VMM) that powers AWS Lambda and AWS Fargate, and has been used in production at AWS since 2018. The traditional view is that there is a choice between virtualization with strong security and high overhead, and container technologies with weaker security and minimal overhead.

article thumbnail

Container security: What it is, why it’s tricky, and how to do it right

Dynatrace

Unfortunately, container security is much more difficult to achieve than security for more traditional compute platforms, such as virtual machines or bare metal hosts. To function effectively, containers need to be able to communicate with each other and with network services. Network scanners. Let’s look at each type.

article thumbnail

Kubernetes: Challenges for observability platforms

Dynatrace

Nevertheless, there are related components and processes, for example, virtualization infrastructure and storage systems (see image below), that can lead to problems in your Kubernetes infrastructure. You haven’t detected that there’s a shortage of disk space on the virtualization host (or its shared storage).

article thumbnail

Everything as Code

Dynatrace

We’re currently in a technological era where we have a large variety of computing endpoints at our disposal like containers, Platform as a Service (PaaS), serverless, virtual machines, APIs, etc. Treating these different processes as code will ensure that best practices are followed. with more being added continually.

Code 108