Trending Articles

article thumbnail

From syslog to AWS Firehose: Dynatrace log management innovations that enhance observability

Dynatrace

Understanding that the first mile of getting data in can often be the hardest, Dynatrace continues to invest in log ingest, offering a range of out-of-the-box solutions within the Dynatrace Platform and apps. We’re excited to announce several log management innovations, including native support for Syslog messages, seamless integration with AWS Firehose, an agentless approach using Kubernetes Platform Monitoring solution with Fluent Bit, a new out-of-the-box ingest dashboard, and OpenPipeline in

article thumbnail

Telemetry Pipelines Workshop: Integrating Fluent Bit With OpenTelemetry, Part 2

DZone

Are you ready to get started with cloud-native observability and telemetry pipelines? This article is part of a series exploring a workshop guiding you through the open source project Fluent Bit, what it is, a basic installation, and setting up the first telemetry pipeline project. Learn how to manage your cloud-native data from source to destination using the telemetry pipeline phases covering collection, aggregation, transformation, and forwarding from any source to any destination.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing PostgreSQL® High Availability – Part I: PostgreSQL Automatic Failover

Scalegrid

Managing High Availability (HA) in your PostgreSQL hosting is very important to ensuring your database deployment clusters maintain exceptional uptime and strong operational performance so your data is always available to your application. In an earlier blog post, we introduced you to configure high availability for PostgreSQL using streaming replication , and now we’re going to show you how to best manage client-side HA.

article thumbnail

Cache Grab: How Much Are You Leaving on the Table?

CSS Wizardry

For the longest time now, I have been obsessed with caching. I think every developer of any discipline would agree that caching is important, but I do tend to find that, particularly with web developers, gaps in knowledge leave a lot of opportunities for optimisation on the table. How does it affect you? Want to know everything (and more) about HTTP cache?

Cache 202
article thumbnail

Continuous reinvention: A brief history of block storage at AWS

All Things Distributed

Marc Olson, a long-time Amazonian, discusses the evolution of EBS, highlighting hard-won lessons in queueing theory, the importance of comprehensive instrumentation, and the value of incrementalism versus radical changes. It's an insightful look at how one of AWS’s foundational services has evolved to meet the needs of our customers.

Storage 203
article thumbnail

Cloud Build Unleashed: Expert Techniques for CI/CD Optimization

DZone

CI/CD and Its Importance We all know what CI/CD is and how it fosters a sense of collaboration among teams and enables them to deliver high-quality software efficiently and reliably. By automating the integration, testing , and deployment processes, CI/CD helps maintain code quality, reduce manual effort, and provide continuous feedback, ultimately leading to faster and more reliable software delivery.

Cloud 290
article thumbnail

Why business resiliency depends on unified observability and security

Dynatrace

The world is more connected than ever before. With global e-commerce spending projected to reach $6.3 trillion this year 1 , more than two-thirds of the adult population now relying on digital payments 2 for financial transactions, and more than 400 million terabytes of data being created each day 3 , it’s abundantly clear that the world now runs on software.

More Trending

article thumbnail

What are Kubernetes Pods? A Deep Dive

Percona

You might have driven a car, but have you ever wondered how the engine works? Similarly if you have used Kubernetes and if you are interested to know how a pod works, this blog post is the right place to start with.

article thumbnail

Empowering builders with the new AWS Asia Pacific (Malaysia) Region

All Things Distributed

Builders are at the heart of AWS. Most recently, I visited Malaysia, the location of the newest AWS Region, our 34th globally, and home to a rapidly evolving technology sector, where businesses of all sizes are proving that solving hard human problems can be a profitable business model.

AWS 107
article thumbnail

Why Replace External Database Caches?

DZone

Teams often consider external caches when the existing database cannot meet the required service-level agreement (SLA). This is a clear performance-oriented decision. Putting an external cache in front of the database is commonly used to compensate for subpar latency stemming from various factors, such as inefficient database internals, driver usage, infrastructure choices, traffic spikes, and so on.

Cache 271
article thumbnail

New SQL injection vulnerability in FileCatalyst Workflow

Dynatrace

Following Tenable Research’s disclosure of a critical SQL injection vulnerability in FileCatalyst Workflow in May 2024, further investigation by Dynatrace revealed another SQL injection vulnerability. The vulnerability, identified as CVE-2024-6632, allows the abuse of a form submission during the setup process to make unauthorized modifications of the database.

Database 238
article thumbnail

For years, tech firms were fighting a war for talent. Now they are waging war on talent.

The Agile Manager

In the years immediately following the dot-com meltdown, there was more tech labor than there were tech jobs. That didn’t last long. By 2005, the tech economy had bounced back on its own. After that, the emergence of mobile (a new and lucrative category of tech) plus low interest rate policy by central banks fueled demand for tech. Before the first decade of the century was out, “tech labor scarcity” became an accepted norm.

article thumbnail

How to Run Percona Toolkit in Kubernetes

Percona

Percona Operator for MySQL, based on Percona XtraDB Cluster (PXC), provides configuration to expose the ProxySQL, HAProxy, and the PXC instances themselves so that you can use Percona Toolkit to connect to MySQL from these endpoints externally.

Cloud 90
article thumbnail

Article: Scaling the Heights: Unveiling the Secrets of Azure Functions’ Cold Starts and Scalability

InfoQ

The insightful piece featured on InfoQ delves into the intricacies of Azure Functions’ Cold Starts, illuminating a topic frequently stirring debate within the serverless computing sphere. With the growing embrace of serverless architectures, discussions around Azure Functions’ cold starts have ignited a firestorm of controversy and given rise to numerous misconceptions.

Azure 84
article thumbnail

Java Performance Tuning: Adjusting GC Threads for Optimal Results

DZone

Garbage Collection (GC) plays an important role in Java’s memory management. It helps to reclaim memory that is no longer in use. A garbage collector uses its own set of threads to reclaim memory. These threads are called GC threads. Sometimes JVM can end up either with too many or too few GC threads. In this post, we will discuss why JVM can end up having too many/too few GC threads, the consequences of it, and potential solutions to address them.

Tuning 258
article thumbnail

Third-party vulnerabilities: Prioritize CVEs with vulnerable function insights

Dynatrace

The Dynatrace third-party vulnerabilities feature provides insights into vulnerable software packages by matching detected package identifiers and version numbers with known vulnerable software packages and related common vulnerabilities and exposures (CVEs). The risk of impact from an existing known vulnerability also depends on whether certain processes are using the vulnerable parts of a software component.

Java 215
article thumbnail

Software Testing with AI: Increase Accuracy and Efficiency

Kovair

With today’s ever-changing software development world, there has never been much demand for top-notch software like nowadays. The complexity of applications calls upon traditional software.

article thumbnail

Percona Server for MySQL Performance Improvements – August 2024

Percona

At Percona, we have always prioritized database performance as a critical factor in selecting database technologies. Recently, we have observed a concerning trend in the community edition of MySQL, where performance appears to be declining across major releases, specifically MySQL versions 5.7, 8.0, and 8.4.

Servers 87
article thumbnail

Performance Testing Tools: Top 10 Picks for 2024

Abstracta

Find our Top 10 Performance Testing Tools in this article, including a balanced mix of open-source platforms and proprietary testing tools. The post Performance Testing Tools: Top 10 Picks for 2024 appeared first on Blog about Software Development, Testing, and AI | Abstracta.

article thumbnail

Kotlin Coroutines and OpenTelemetry Tracing

DZone

I recently compared three OpenTelemetry approaches on the JVM: Java Agent v1, v2, and Micrometer. I used Kotlin and coroutines without overthinking. I received interesting feedback on the usage of @WithSpan with coroutines: Indeed, the @WithSpan annotation has worked flawlessly in conjunction with coroutines for some time already. However, it made me think about the underlying workings of OpenTelemetry.

Java 271
article thumbnail

Exposure management vs. vulnerability management: Preventing attacks with a robust cybersecurity strategy

Dynatrace

In today’s complex digital landscape, protecting your organization from cyber threats is more crucial than ever. Highly distributed multicloud systems and an ever-changing threat landscape facilitate potential vulnerabilities going undetected, putting organizations at risk. A robust application security strategy is vital to ensuring the safety of your organization’s data and applications.

Strategy 187
article thumbnail

Providing better attribution

Speed Curve

Making newer RUM metrics more actionable has been a significant priority for standards bodies. RUM has always been incredibly important for any organization focused on performance, but it’s only in the last few years that it has started to become more actionable. A big part of this shift has been better attribution so we can tell what's actually going on.

Metrics 52
article thumbnail

Addressing Data Size Differences in MongoDB Replica Set Nodes

Percona

When working with MongoDB replication in environments using the WiredTiger storage engine, you may encounter data size discrepancies between PRIMARY and SECONDARY nodes. When this problem arises, the SECONDARY node uses significantly more disk space than the PRIMARY instance.

Storage 83
article thumbnail

Effect of POSIX_FADV_SEQUENTIAL and POSIX_FADV_RANDOM on IO performance.

n0derunner

Example timings forreading a file sequentially 8k per request – after invalidating/dropping Linux filesystem caches. (echo 3 > /proc/sys/vm/drop_caches) An absolutely massive difference… What fadvise_sequential basically instructs the filesystem to read-ahead asynchronously, whereas fadvise_random does neither (similar behavior/speed was observed for ext2 and ext4 filesystems) From iostat we see this POSIX_FADV_RANDOM The iosize in iostat … The post Effect of POSIX_FADV_SEQUENTIA

article thumbnail

Improving Snowflake Performance by Mastering the Query Profile

DZone

Having worked with over 50 Snowflake customers across Europe and the Middle East, I've analyzed hundreds of Query Profiles and identified many issues including issues around performance and cost.

article thumbnail

Dynatrace named to Constellation Research annual ShortList™ of top vendors

Dynatrace

Dynatrace has been named to Constellation’s annual ShortList™ of top vendors, recognized in three critical categories: Observability, AIOps, and Digital Performance Management. This underscores Dynatrace’s commitment to driving digital transformation through its end-to-end observability platform. What is the Constellation ShortList™? The Constellation ShortList™ is a portfolio of technology solutions curated by Constellation analysts to help organizations narrow their search for technologies tha

article thumbnail

Most Common RabbitMQ Use Cases

Scalegrid

Wondering where RabbitMQ fits into your architecture? This article expands on the most commonly used RabbitMQ use cases, from microservices to real-time notifications and IoT. Learn how RabbitMQ can boost your system’s efficiency and reliability in these practical scenarios. Key Takeaways RabbitMQ is a versatile message broker that improves communication across various applications, including microservices, background jobs, and IoT devices.

IoT 130
article thumbnail

How to Upgrade a Kubernetes Cluster

Percona

I still remember upgrading a Kubernetes cluster for the first time. Despite taking great care and following all the documentation, I managed to break some applications. Luckily, the impact was minimal, and the issue was solved quickly.

article thumbnail

Reader Q&A: What’s the best way to pass an istream parameter?

Sutter's Mill

Here’s a super simple question: “How do I write a parameter that accepts any non- const std::istream argument? I just want an istream I can read from.” (This question isn’t limited to streams, but includes any similar type you have to modify/traverse to use.) Hopefully the answer will be super simple, too! So, before reading further: What would be your answer?

C++ 67
article thumbnail

Overcoming the Retry Dilemma in Distributed Systems

DZone

“Insanity is doing the same thing over and over again, but expecting different results” - Source unknown As you can see in the quote above, humans have this tendency to retry things even when results are not going to change. This was manifested in systems designs as well where we pushed these biases when designing systems.

Systems 259
article thumbnail

Dynatrace Managed release notes version 1.298

Dynatrace

We have released Dynatrace Managed version 1.298. To learn what’s new, have a look at the release notes. The post Dynatrace Managed release notes version 1.298 appeared first on Dynatrace news.

200
200
article thumbnail

RabbitMQ Security and Compliance

Scalegrid

Follow fundamental procedures in authentication, encryption, and commitment to RabbitMQ security protocols to protect your RabbitMQ system and secure messages. This article provides instructions on how to fortify your RabbitMQ setup. Key Takeaways Securing RabbitMQ involves implementing strong authentication and authorization mechanisms, such as username/password pairs, X.509 certificates, and OAuth 2.0, to prevent unauthorized access and ensure data protection.

article thumbnail

PostgreSQL Internals for Newbies: A Guide to Data Storage, Part One

Percona

Database novices often wonder how ‘things work behind the scenes’ when starting with PostgreSQL. Many things happen when creating a table and adding data that are not apparent. You might ask, ‘Where does the data go?’ Luckily, it is easy to discover the details.

Storage 67
article thumbnail

Jepsen Test Validates ACID Nature of Volt Streaming Capabilities

VoltDB

Volt Active Data (Volt) is a sophisticated real-time data platform intricately designed with multiple critical components, including high-speed data processing, in-memory storage, and ACID-compliant transactions. Volt’s outbound streaming data (also known as Export) functionality, a key aspect of its distributed database system, has multiple components crucial for efficient data movement.

Testing 52
article thumbnail

Anomaly Detection: The Dark Horse of Fraud Detection

DZone

Today, machine learning-based fraud prediction has become a mainstay in most organizations. The two common types of machine learning are supervised and unsupervised machine learning. Out of the two, supervised learning is the most desired choice for fraud prediction for apparent reasons. Supervised learning that learns the patterns from known fraud cases yields more accurate predictions.

article thumbnail

Build systems more reliably with Dynatrace: Chaos Engineering

Dynatrace

The previous blog post in this series discussed the benefits of implementing early observability and orchestration of the CI/CD pipeline using Dynatrace. This approach enhances key DORA metrics and enables early detection of failures in the release process, allowing SREs more time for innovation. This blog post explores the Reliability metric , which measures modern operational practices.

article thumbnail

NEW: Paper cuts update!

Speed Curve

Paper cut: (literal) A wound caused by a piece of paper or any thin, sharp material that can slice through skin. (figurative) A trivial-seeming problem that causes a surprising amount of pain. We all love big showy features, and this year we've released our share of those. But sometimes it's the small stuff that can make a big difference. We recently took a look at our backlog of smaller requests from our customers – which we labelled "paper cuts" – and decided to dedicate time to ta

Cache 52