article thumbnail

How Netflix uses eBPF flow logs at scale for network insight

The Netflix TechBlog

By Alok Tiagi , Hariharan Ananthakrishnan , Ivan Porto Carrero and Keerti Lakshminarayan Netflix has developed a network observability sidecar called Flow Exporter that uses eBPF tracepoints to capture TCP flows at near real time. Without having network visibility, it’s difficult to improve our reliability, security and capacity posture.

Network 325
article thumbnail

Hyper Scale VPC Flow Logs enrichment to provide Network Insight

The Netflix TechBlog

Without having network visibility, it’s not possible to improve our reliability, security and capacity posture. Network Availability: The expected continued growth of our ecosystem makes it difficult to understand our network bottlenecks and potential limits we may be reaching. 43416 5001 52.213.180.42

Network 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Transforms podcast: What we don’t know about America’s “Wireless Wars” with China – but should

Dynatrace

In addition to his career as a bestselling author, Pelson has served as a vice president at Lucent Technologies and chief of convergence strategy for British Telecom. The Chinese multinational tech giant, Huawei, dominates investment and activity in the 5G network. organizations, but also by Western, Japanese, and Korean ones.

Wireless 182
article thumbnail

What is RASP? Why runtime application self-protection is important, and how to do it right

Dynatrace

RASP capabilities aim to close the gap left by application security testing and network perimeter controls such as web application firewalls (WAFs). Conversely, a decentralized approach protects application servers using multiple firewalls to protect against attacks that may have penetrated the network. Eliminate false positives.

Tuning 231
article thumbnail

Tech Transforms podcast: How to ensure both zero trust and positive user experiences at federal agencies

Dynatrace

Read the blog “Trust nothing and no one” security policies can enhance user experiences Within the Cybersecurity and Infrastructure Security Agency (CISA), there are five Zero Trust Maturity Model pillars: identity, devices, networks, applications/workloads, and data. The result is frictionless, secure interactions.

article thumbnail

What is explainable AI? The key to closing the AI confidence gap

Dynatrace

DevOps tools , security response systems , search technologies, and more have all benefited from AI technology’s progress. Safety concerns are at the forefront of autonomous vehicle development, and model understandability is crucial to improving and maintaining functionality in such technology.

article thumbnail

Kubernetes vs Docker: What’s the difference?

Dynatrace

If cloud-native technologies and containers are on your radar, you’ve likely encountered Docker and Kubernetes and might be wondering how they relate to each other. In a nutshell, they are complementary and, in part, overlapping technologies to create, manage, and operate containers. Networking. Dynatrace news.