Remove Infrastructure Remove Java Remove Performance Remove Traffic
article thumbnail

Building Netflix’s Distributed Tracing Infrastructure

The Netflix TechBlog

Now let’s look at how we designed the tracing infrastructure that powers Edgar. This insight led us to build Edgar: a distributed tracing infrastructure and user experience. Our tactical approach was to use Netflix-specific libraries for collecting traces from Java-based streaming services until open source tracer libraries matured.

article thumbnail

What is infrastructure as code? Discover the basics, benefits, and best practices

Dynatrace

.” While this methodology extends to every layer of the IT stack, infrastructure as code (IAC) is the most prominent example. Here, we’ll tackle the basics, benefits, and best practices of IAC, as well as choosing infrastructure-as-code tools for your organization. What is infrastructure as code? Consistency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Migrating Netflix to GraphQL Safely

The Netflix TechBlog

This blog post will share broadly-applicable techniques (beyond GraphQL) we used to perform this migration. A single API team maintained both the Java implementation of the Falcor framework and the API Server. This helped us successfully migrate 100% of the traffic on the mobile homepage canvas to GraphQL in 6 months.

Traffic 353
article thumbnail

Digital transformation strategies: Success stories from three digital transformation journeys

Dynatrace

They help organizations streamline and automate complex and time-consuming procedures and improve overall performance. However, digital transformation requires significant investment in technology infrastructure and processes. Previously, they had 12 tools with different traffic thresholds. Improved customer experience.

Strategy 180
article thumbnail

Log auditing and log forensics benefit from converging observability and security data

Dynatrace

Log auditing—and its investigative partner, log forensics—are becoming essential practices for securing cloud-native applications and infrastructure. As organizations adopt more cloud-native technologies, observability data—telemetry from applications and infrastructure, including logs, metrics, and traces—and security data are converging.

Analytics 190
article thumbnail

New Dynatrace Operator elevates cloud-native observability for Kubernetes

Dynatrace

Today we’re proud to announce the new Dynatrace Operator, designed from the ground up to handle the lifecycle of OneAgent, Kubernetes API monitoring, OneAgent traffic routing, and all future containerized componentry such as the forthcoming extension framework. Dynatrace Operator for OneAgent, API monitoring, routing, and more.

Cloud 229
article thumbnail

What is vulnerability management? And why runtime vulnerability detection makes the difference

Dynatrace

Security vulnerabilities are weaknesses in applications, operating systems, networks, and other IT services and infrastructure that would allow an attacker to compromise a system, steal data, or otherwise disrupt IT operations. Scanning the runtime environment of your services can help to identify unusual network traffic patterns.

Traffic 168