Hero background

Dynatrace Engineering Blog

Tutorials, tips and resources for engineers on cloud technologies and observability

Background wave overlay

AllObservabilityCloud nativeAIOpsOpen sourceResearchApplication security

All

KubeCon EU 2025 key takeaways: Spotlight on cloud-native observability

For observability watchers and cloud-native fans, KubeCon EU didn’t disappoint. Discover key takeaways and breakthrough Dynatrace sessions.

Read now

The rise of agentic AI part 1: Understanding MCP, A2A, and the future of automation

What is agentic AI? Learn how Model Context Protocol and A2A help next-level AI agents communicate to fuel the latest automation revolution.

Read now

Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior

By combining different data sources like logs and runtime context, Dynatrace can help improve detection accuracy and create actionable findings.

Read now

Distributed tracing best practices for the software development lifecycle

Distributed tracing for developers at every stage of the development lifecycle helps to deliver services that fulfill core business goals.

Read now

Kubernetes security essentials: Kubernetes misconfiguration attack paths and mitigation strategies

A Kubernetes misconfiguration can lead to security vulnerabilities. Learn how attackers exploit them, and how to mitigate attacks.

Read now

Kubernetes security essentials: Understanding Kubernetes security misconfigurations

All too often, Kubernetes misconfigurations become security misconfigurations. Learn why, and how to avoid them.

Read now

KubeCon EU 2025 retrospective: Reflections from my sixth KubeCon

Join Adriana Villela as she takes you behind the scenes for the innovation, fun, and friends at KubeCon EU 2025 in London.

Read now

Solve hybrid Kubernetes performance and reliability problems with unified observability

Unified observability helps solve performance and reliability problems on hybrid Kubernetes clusters that span Windows and Linux systems.

Read now

How to observe logs with Journald and Dynatrace

Enhance observability of modern operating systems and close your Kubernetes monitoring gaps with Journald structured logs.

Read now
Engineering

KubeCon EU 2025 key takeaways: Spotlight on cloud-native observability

For observability watchers and cloud-native fans, KubeCon EU didn’t disappoint. Discover key takeaways and breakthrough Dynatrace sessions.

Read now

The rise of agentic AI part 1: Understanding MCP, A2A, and the future of automation

What is agentic AI? Learn how Model Context Protocol and A2A help next-level AI agents communicate to fuel the latest automation revolution.

Read now

Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior

By combining different data sources like logs and runtime context, Dynatrace can help improve detection accuracy and create actionable findings.

Read now

Distributed tracing best practices for the software development lifecycle

Distributed tracing for developers at every stage of the development lifecycle helps to deliver services that fulfill core business goals.

Read now

Kubernetes security essentials: Kubernetes misconfiguration attack paths and mitigation strategies

A Kubernetes misconfiguration can lead to security vulnerabilities. Learn how attackers exploit them, and how to mitigate attacks.

Read now

Kubernetes security essentials: Understanding Kubernetes security misconfigurations

All too often, Kubernetes misconfigurations become security misconfigurations. Learn why, and how to avoid them.

Read now
Application security

Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior

By combining different data sources like logs and runtime context, Dynatrace can help improve detection accuracy and create actionable findings.

Read now

Kubernetes security essentials: Kubernetes misconfiguration attack paths and mitigation strategies

A Kubernetes misconfiguration can lead to security vulnerabilities. Learn how attackers exploit them, and how to mitigate attacks.

Read now

Kubernetes security essentials: Understanding Kubernetes security misconfigurations

All too often, Kubernetes misconfigurations become security misconfigurations. Learn why, and how to avoid them.

Read now

NGINX vulnerability: Quickly detect and mitigate IngressNightmare vulnerabilities with Dynatrace

Quickly find and mitigate the IngressNightmare vulnerabilities affecting Kubernetes clusters with Dynatrace.

Read now

VMware Security Advisory VMSA-2025-0004: Quickly find, remediate, and automate

VMSA-2025-0004 contains three vulnerabilities in VMware ESXi. Quickly find affected systems and automate remediation using Dynatrace.

Read now

Hidden indicators: Tracing the emergence of Apache Struts CVE-2024-53677

Apache Struts CVE-2024-53677 introduces risk to the file upload mechanism. We identified early indicators to mitigate its impact.

Read now