Remove Code Remove Document Remove Network Remove Servers
article thumbnail

A Gentle Intro to eBPF

DZone

TLDR eBPF is a mechanism that makes the kernel dynamically programmable without modifying the source code. eBPF has been running in production for over half a decade at an internet scale on millions of servers. eBPF use cases range from observability, networking, security, tracing, and profiling.

Internet 195
article thumbnail

Mastering MongoDB® Timeout Settings

Scalegrid

MongoDB drivers provide several options for Mongo clients to handle different network timeout errors that may occur during usage. Typical applications are interacting with different database servers based on the business logic. Primarily there are three kinds: Server selection timeout, Connection Timeout, and Socket Timeout.

Java 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Dynatrace protects its software development and delivery life cycle against supply chain attacks

Dynatrace

Typically, the attackers attempt to exploit some weakness in the vendor’s development or delivery life cycle and attempt to inject malicious code before an application is signed and certified. It all starts with the code. Dynatrace has established a secure SDL, which automatically enforces that all developed code is reviewed by a peer.

Software 230
article thumbnail

Setting Up MongoDB SSL Encryption

Scalegrid

Each section is crafted to elevate your database’s security protocol, from acquiring the necessary SSL certificates to configuring server and client connections. Preparing SSL Certificates for MongoDB The SSL certificates are necessary for our MongoDB server to establish secure SSL/TLS communications.

Servers 130
article thumbnail

What is Log4Shell? The Log4Shell vulnerability explained (and what to do about it)

Dynatrace

Since December 10, days after a critical vulnerability known as Log4Shell was discovered in servers supporting the game Minecraft, millions of exploit attempts have been made of the Log4j 2 Java library, according to one team tracking the impact, with potential threat to millions more applications and devices across the globe. Dynatrace news.

Internet 259
article thumbnail

Kubernetes And Kernel Panics

The Netflix TechBlog

Without a real return code, how can they know if it is safe to retry or not? When this happens, usually a k8s cloud-controller provided by the cloud vendor will detect that the actual server, in our case an EC2 Instance, has actually gone away, and will in turn delete the k8s node object. Where Do Lost Nodes Come From? UDP packet?

Hardware 228
article thumbnail

PostgreSQL® Hostname Configuration

Scalegrid

Configure the PostgreSQL hostname by editing configuration files and restarting the server, with secure storage of connection details to enhance security. It represents either an IP address or domain name of the server, where one can find those databases located. What is a Hostname in PostgreSQL?

Database 130