article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Host analysis focuses on operating systems, virtual machines, and containers to understand if there are software components with known vulnerabilities that can be patched. These can include the configuration of operating system access controls and the use of unnecessary libraries or system services.

article thumbnail

Kubernetes: Challenges for observability platforms

Dynatrace

Nevertheless, there are related components and processes, for example, virtualization infrastructure and storage systems (see image below), that can lead to problems in your Kubernetes infrastructure. You haven’t detected that there’s a shortage of disk space on the virtualization host (or its shared storage).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AWS re:Invent 2017: How Netflix Tunes EC2

Brendan Gregg

A video of the talk is on youtube : The slides are on slideshare : I love this talk as I get to share more about what the Performance and Operating Systems team at Netflix does, rather than just my work. Virtual Memory. File System. Andrew Spyker (Titus) co-presented Elastic Load Balancing Deep Dive and Best Practices.

Tuning 61
article thumbnail

AWS re:Invent 2017: How Netflix Tunes EC2

Brendan Gregg

A video of the talk is on youtube : The slides are on slideshare : I love this talk as I get to share more about what the Performance and Operating Systems team at Netflix does, rather than just my work. Virtual Memory. File System. Andrew Spyker (Titus) co-presented Elastic Load Balancing Deep Dive and Best Practices.

Tuning 52
article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. Without further ado, let’s start with the OS settings.

article thumbnail

Why Your Performance Testing Strategy Needs to Shift Left

Dotcom-Montior

Additionally, end users can access your site or applications from anywhere in the world using different browsers, operating systems, and mobile devices, all with varying connection speeds. LoadView – Best Practices and Process.

article thumbnail

What Is a Workload in Cloud Computing

Scalegrid

Various forms can take shape when discussing workloads within the realm of cloud computing environments – examples include order management databases, collaboration tools, videoconferencing systems, virtual desktops, and disaster recovery mechanisms. This applies to both virtual machines and container-based deployments.

Cloud 130