article thumbnail

A Gentle Intro to eBPF

DZone

eBPF has been running in production for over half a decade at an internet scale on millions of servers. You'll see the term BPF in Linux source code, and you'll see BPF and eBPF used interchangeably in tooling and documentation. TLDR eBPF is a mechanism that makes the kernel dynamically programmable without modifying the source code.

Internet 195
article thumbnail

Overseeing SaaS security with AWS AppFabric and Dynatrace

Dynatrace

To learn more, visit the DQL guide documentation. 16) our company users access the internet from. To connect your SaaS applications to AWS AppFabric, follow the getting started documentation. Go to the Logs and events explorer and then turn on Advanced mode.

AWS 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Dynatrace EdgeConnect securely connects your local systems to Dynatrace SaaS

Dynatrace

Flexible and adaptable connections to internet-based services like ServiceNow via a dedicated host and IP that you control. Have a look at our documentation to learn more about how to configure and deploy EdgeConnect. Integration of data from your internal data warehouse to Dynatrace dashboards, blended with data from Grail.

Systems 225
article thumbnail

Dynatrace strengthens container security across popular cloud-based registries

Dynatrace

Cloud-native CI/CD pipelines and build processes often expose Kubernetes to attack vectors via internet-sourced container images. For current Dynatrace customers, getting started with our new signed, immutable images is easy—just refer to Dynatrace Documentation.

Cloud 217
article thumbnail

Trade-offs under pressure: heuristics and observations of teams resolving internet service outages (Part 1)

The Morning Paper

Trade-offs under pressure: heuristics and observations of teams resolving internet service outages , Allspaw, Masters thesis, Lund University, 2015. The document runs to 87 pages, so I’m going to cover the material across two posts. Business-critital Internet systems inherit all of the challenges of distributed systems.

article thumbnail

What is Log4Shell? The Log4Shell vulnerability explained (and what to do about it)

Dynatrace

The vulnerability, published as CVE-2021-44228 , enables a remote attacker to take control of a device on the internet, if the device is running certain versions of Log4j 2. Simply put, attackers can remotely take over any internet-connected device that uses certain versions of the Log4j library anywhere in the software stack.

Internet 262
article thumbnail

AnyLog: a grand unification of the Internet of things

The Morning Paper

AnyLog: a grand unification of the Internet of Things , Abadi et al., Despite the "Internet of Things" featuring prominently in the title, there’s nothing particular to IoT in the technical solution at all. CIDR’20. It just happens to be an initial use case that fits well with the AnyLog model.