Sat.Aug 19, 2023 - Fri.Aug 25, 2023

article thumbnail

How to Configure an HTTPS Endpoint for Mule Applications With One-Way SSL

DZone

In this post, we will learn about the steps involved in the process of configuring an HTTPS endpoint with one-way SSL for a Mule Application. Securing communication between clients and servers is essential in today's digital world, and using HTTPS over HTTP ensures secure data transfer. Before we start, let's understand how does CloudHub load balancer work.

Servers 246
article thumbnail

Complete Kubernetes observability with logs in topology context

Dynatrace

Kubernetes workload management is easier with a centralized observability platform When deploying applications with Kubernetes, the configuration is flexible and declarative, allowing for scalability. However, due to the distributed nature of Kubernetes, it can be difficult to understand overall deployment health and the status of Kubernetes clusters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Deprecation of qpress/QuickLZ Compression Algorithm

Percona

To reduce the backup size, save storage space, and speed up the backup and restore process, you can compress a backup with Percona XtraBackup. To compress and decompress local or streaming backups, Percona XtraBackup uses xbstream – a binary that supports simultaneously compressing and streaming dynamically generated files. The XtraBackup –compress option makes XtraBackup compress all output data, including the transaction log file and metadata files, with one of the sup ported compr

article thumbnail

Golem Unveils a Resilient Computing Platform for Serverless Workers with WebAssembly Component Model

InfoQ

Recently Golem released its flagship product Golem Cloud, a durable computing platform allowing developers to build and deploy long-running, stateful serverless workers that are resistant to failures, upgrades, and updates. The product is currently in developer preview.

article thumbnail

Visualizing IoT Data With MQTT, QuestDB, and Grafana

DZone

Monitoring Time-Series IoT Device Data Time-series data is crucial for IoT device monitoring and data visualization in industries such as agriculture, renewable energy, and meteorology. It enables trend analysis, anomaly detection, and predictive analytics, empowering businesses to optimize performance and make data-driven decisions. Thanks to technological advancements and the accessibility of open-source tools, gathering and analyzing data from IoT devices has become easier than ever before.

IoT 241
article thumbnail

IT modernization improves public health services at state human services agencies

Dynatrace

IT modernization improves public health services at state human services agencies For many organizations, the pandemic was a crash course in IT modernization as agencies scrambled to meet the community’s needs as details unfolded. The early days of the pandemic highlighted the importance of communicating with the public and getting the message right.

article thumbnail

Updated Percona Distributions for MongoDB, Metadata Table for QAN in PMM: Release Roundup August 21, 2023

Percona

Percona is a leading provider of unbiased, performance-first, open source database solutions that allow organizations to easily, securely, and affordably maintain business agility, minimize risks, and stay competitive, free from vendor lock-in. Percona software is designed for peak performance, uncompromised security, limitless scalability, and disaster-proofed availability.

More Trending

article thumbnail

Getting Started With Prometheus Workshop: Service Discovery

DZone

Are you interested in open-source observability but lack the knowledge to just dive right in? This workshop is for you, designed to expand your knowledge and understanding of open-source observability tooling that is available to you today.

article thumbnail

OpenTelemetry observability and Dynatrace deliver actionable answers at scale

Dynatrace

If a microservice falls in the forest and all your monitoring solutions report it differently, can operators accurately trace what happened and automate a response? OpenTelemetry observability provides the answer to this philosophical conundrum. Different monitoring point solutions, such as Jaeger, Zipkin, Logstash, Fluentd, and StatsD, each have their own way of observing and recording such an event.

article thumbnail

High Availability vs. Fault Tolerance: Is FT’s 00.001% Edge in Uptime Worth the Headache?

Percona

Estimates vary, but most reports put the average cost of unplanned database downtime at approximately $300,000 to $500,000 per hour, or $5,000 to $8,000 per minute. With so much at stake, database high availability and fault tolerance have become must-have items, but many companies just aren’t certain which one they must have. This blog article will examine shared attributes of high availability (HA) and fault tolerance (FT).

article thumbnail

An effective team communicates much like optimized code: with clarity, modularity, and a focus on simplicity.

Addy Osmani

Much has been said about the role of communication within software teams. For those who have labored through the complexities of large-scale projects, it's evident that the craft of software development isn't just some solitary endeavor of wrangling code. Rather, it's a collective effort that often happens in a team, and its success hinges on effective communication.

Code 56
article thumbnail

AWS Outages: Is North Virginia the Least Reliable AWS Region and Why?

DZone

It's a common belief among AWS users that Northern Virginia, also known as US East or N. Virginia (US-East-1), is the region with the least reliability when it comes to uptime. To verify this, we analyzed the AWS outage history from 2022 across various regions, specifically focusing on whether N. Virginia truly experienced the most downtime.

AWS 230
article thumbnail

Maximize user experience with out-of-the-box service-performance SLOs

Dynatrace

SLOs cover a wide range of monitoring options for different applications. This article explores SLOs for service performance. If you’re new to SLOs and want to learn more about them, how they’re used, and best practices, see the additional resources listed at the end of this article. According to the Google Site Reliability Engineering (SRE) handbook, monitoring the four golden signals is crucial in delivering high-performing software solutions.

article thumbnail

Failover and Recovery Scenarios in InnoDB Cluster and ClusterSet

Percona

This blog post will focus on failover and recovery scenarios inside the InnoDB Cluster and ClusterSet environment. To know more about the deployments of these topologies, you can refer to the manuals – InnoDB Cluster and Innodb ClusterSet setup. In the below snippet, we have two clusters (cluster1 and cluster2), which are connected via an async channel and combined, known as a ClusterSet topology.

Traffic 81
article thumbnail

Machine Learning Libraries For Any Project

DZone

There are many libraries out there that can be used in machine learning projects. Of course, some of them gained considerable reputations through the years. Such libraries are the straight-away picks for anyone starting a new project which utilizes machine learning algorithms. However, choosing the correct set (or stack) may be quite challenging. The Why In this post, I would like to give you a general overview of the machine learning libraries landscape and share some of my thoughts about worki

230
230
article thumbnail

Introduction to the Tower Library

DZone

One of the components of my OpenTelemetry demo is a Rust application built with the Axum web framework. In its description, axum mentions: axum doesn't have its own middleware system but instead uses tower::Service. This means axum gets timeouts, tracing, compression, authorization, and more, for free. It also enables you to share middleware with applications written using hyper or tonic.

Systems 228
article thumbnail

8 Ways to Improve Application Performance

DZone

Application performance is critical for delivering a fast and responsive user experience. Slow performance, or high latency, can lead to frustrated users and lost revenue for the organization. From a high level, application latency refers to the delay between the user's request and the application's response. Latency can not only impact the overall user experience and decrease engagement, but it can be a costly and complicated problem as well.

article thumbnail

Azure Monitoring Agent: Key Features and Benefits

DZone

In today's rapidly evolving digital landscape, businesses increasingly rely on cloud computing and infrastructure to support their operations. As organizations migrate their workloads to the cloud, robust monitoring and management tools are paramount to ensure optimal performance, security, and efficiency. In response to this demand, Microsoft Azure has introduced the Azure Monitoring Agent (AMA), a powerful and versatile solution designed to enhance the monitoring capabilities of Azure resource

Azure 216
article thumbnail

It’s 2 AM. Do You Know What Your Code Is Doing?

DZone

Once we press the merge button, that code is no longer our responsibility. If it performs sub-optimally or has a bug, it is now the problem of the DevOps team, the SRE, etc. Unfortunately, those teams work with a different toolset. If my code uses up too much RAM, they will increase RAM. When the code runs slower, it will increase CPU. In case the code crashes, they will increase concurrent instances.

Code 188
article thumbnail

Tech Transforms podcast: It’s time to get familiar with generative AI

Dynatrace

Understanding generative AI and how to use it can unlock boundless innovation. Tracy Bannon , Senior Principal/Software Architect and DevOps Advisor at MITRE , is passionate about DevSecOps and the potential impact of artificial intelligence (AI) on software development. However, AI is a relatively new technology. Individuals and organizations are still working to understand the potential impact of generative AI, both positive and negative.

article thumbnail

Just-In-Time (JIT) Compilation: Advantages, Disadvantages, and Future Trends

DZone

Just-In-Time is a dynamic compilation technique that allows software programs to be compiled at runtime, optimizing performance and reducing startup times. It has enabled developers to write code that is both highly efficient and flexible, thanks to this innovative approach. With JIT compilation, developers can now focus on writing code that is more expressive and concise without sacrificing performance.

article thumbnail

Why you need a unified, AI-powered log management solution

Dynatrace

As organizations grow, cloud application environments create complexity that makes managing and analyzing log data difficult. A traditional log management solution uses an often manual and siloed approach, which limits scalability and ultimately hinders organizational innovation. “Traditional monitoring approaches worked fine when an operator was tasked with tracking a simple, static system,” wrote Ali Siddiqui in “ How to harness the power of observability, AIOps and automation.” But, he

Analytics 150
article thumbnail

Extracting Maximum Value From Logs

DZone

Logging is arguably the most important element of your observability solution. Logs provide foundational and rich information about system behavior. In an ideal world, you would make all the decisions about logging and implement a consistent approach across your entire system. However, in the real world, you might work with legacy software or deal with different programming languages, frameworks, and open-source packages, each with its own format and structure for logging.

article thumbnail

Snowflake Workload Optimization

DZone

In the era of big data, efficient data management and query performance are critical for organizations that want to get the best operational performance from their data investments. Snowflake, a cloud-based data platform, has gained immense popularity for providing enterprises with an efficient way of handling big data tables and reducing complexity in data environments.

Big Data 130
article thumbnail

Log Analysis: Elasticsearch vs. Apache Doris

DZone

As a major part of a company's data asset, logs bring value to businesses in three aspects: system observability, cyber security, and data analysis. They are your first resort for troubleshooting, your reference for improving system security, and your data mine, where you can extract information that points to business growth. Logs are the sequential records of events in the computer system.

Systems 100
article thumbnail

What Are X-forwarded Headers, and Why Is It Used?

DZone

HTTP headers are essential elements in the communication between clients (e.g., web browsers) and servers on the internet. They contain metadata, which is additional information about the client or the request being made. These headers allow clients and servers to negotiate and agree on various aspects of communication. For example, headers can specify the format in which the client expects the response data, such as JSON or XML.

Internet 100
article thumbnail

Mitigate the Risks of Poor Performing Cloud Apps

DZone

Cloud technology is no longer novel. It has revolutionized the manner in which business services are provided to the end user. It has made it easier and faster for companies to access and share data, collaborate on projects, and access applications from anywhere in the world. Is Cloud the 'One Medicine for All Diseases'? Cloud technology has empowered businesses to become more flexible and responsive to customer needs.

Cloud 100
article thumbnail

Automated Percona Monitoring and Management Upgrades

Percona

Welcome to our guide on keeping your Percona Monitoring and Management (PMM) Server and Client up-to-date. In this blog post, we’ll walk you through a method to ensure your PMM solution runs the latest and most secure versions. It’s important to note that this is just one option among many, and we’re eager to hear your feedback and alternative approaches.

article thumbnail

Configuring PostgreSQL and LDAP Using StartTLS

Percona

Effectively working with LDAP as an authentication mechanism for PostgreSQL typically requires extensive knowledge in both domains. While trying to be as complete yet succinct as possible, I’m detailing how to enable TLS between a PostgreSQL and the OpenLDAP server. Ironically, the most complicated aspect has nothing to do with either PostgreSQL or OpenLDAP but with the steps of creating and signing private keys and certificates.

C++ 74