article thumbnail

Trace, diagnose, resolve: Introducing the Infrastructure & Operations app for streamlined troubleshooting

Dynatrace

Infrastructure and operations teams must maintain infrastructure health for IT environments. With the Infrastructure & Operations app ITOps teams can quickly track down performance issues at their source, in the problematic infrastructure entities, by following items indicated in red.

article thumbnail

How Netflix uses eBPF flow logs at scale for network insight

The Netflix TechBlog

By Alok Tiagi , Hariharan Ananthakrishnan , Ivan Porto Carrero and Keerti Lakshminarayan Netflix has developed a network observability sidecar called Flow Exporter that uses eBPF tracepoints to capture TCP flows at near real time. Without having network visibility, it’s difficult to improve our reliability, security and capacity posture.

Network 325
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

For your eyes only: improving Netflix video quality with neural networks

The Netflix TechBlog

Recently, we added another powerful tool to our arsenal: neural networks for video downscaling. In this tech blog, we describe how we improved Netflix video quality with neural networks, the challenges we faced and what lies ahead. How can neural networks fit into Netflix video encoding?

Network 292
article thumbnail

Building Netflix’s Distributed Tracing Infrastructure

The Netflix TechBlog

Now let’s look at how we designed the tracing infrastructure that powers Edgar. Reconstructing a streaming session was a tedious and time consuming process that involved tracing all interactions (requests) between the Netflix app, our Content Delivery Network (CDN), and backend microservices.

article thumbnail

Leveraging Infrastructure as Code for Data Engineering Projects: A Comprehensive Guide

DZone

Data engineering projects often require the setup and management of complex infrastructures that support data processing, storage, and analysis. Traditionally, this process involved manual configuration, leading to potential inconsistencies, human errors, and time-consuming deployments.

article thumbnail

Visual Network Mapping Your K8s Clusters To Assess Performance

DZone

Growing organizations, in the process of upscaling their services, unintentionally introduce complexities into the system. Knowing how the infrastructure is set up and how clusters operate and communicate are crucial. Although Kubernetes is the defacto choice for container orchestration, many organizations fail to implement it.

Network 300
article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Protecting IT infrastructure, applications, and data requires that you understand security weaknesses attackers can exploit. Vulnerability assessment is the process of identifying, quantifying, and prioritizing the cybersecurity vulnerabilities in a given IT system. NMAP is an example of a well-known open-source network scanner.