Hero background

Dynatrace Engineering Blog

Tutorials, tips and resources for engineers on cloud technologies and observability

Background wave overlay

AllObservabilityCloud nativeAIOpsOpen sourceApplication security

All

How Dynatrace Kubernetes Monitoring powers smarter insights

Kubernetes complexity poses significant monitoring challenges. Discover how Dynatrace Kubernetes monitoring solves Kubernetes complexity.

Read now

Threat detection in cloud native environments (part 2): How to automate threat management using workflows

This blog covers three building blocks of handling threats: Leave no gaps, get the right eyes on it, and respond quickly.

Read now

Revisiting Spring4Shell: How Cloud Application Detection and Response (CADR) offers multi-layer protection

Using Spring4Shell as an example, discover how Dynatrace can detect and prevent exploitation on multiple layers.

Read now

Mastering sign-in log monitoring: How to secure user identity with Dynatrace

Cyberattacks are increasingly shifting user identities. Discover show sign-in monitoring is crucial to secure user identity.

Read now

Go big with Dynatrace: Native support for large log records

Go big with Dynatrace: Native support for large log records

Read now

KubeCon EU 2025 key takeaways: Spotlight on cloud-native observability

For observability watchers and cloud-native fans, KubeCon EU didn’t disappoint. Discover key takeaways and breakthrough Dynatrace sessions.

Read now

The rise of agentic AI part 1: Understanding MCP, A2A, and the future of automation

What is agentic AI? Learn how Model Context Protocol and A2A help next-level AI agents communicate to fuel the latest automation revolution.

Read now

Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior

By combining different data sources like logs and runtime context, Dynatrace can help improve detection accuracy and create actionable findings.

Read now

Distributed tracing best practices for the software development lifecycle

Distributed tracing for developers at every stage of the development lifecycle helps to deliver services that fulfill core business goals.

Read now
Application security

Threat detection in cloud native environments (part 2): How to automate threat management using workflows

This blog covers three building blocks of handling threats: Leave no gaps, get the right eyes on it, and respond quickly.

Read now

Revisiting Spring4Shell: How Cloud Application Detection and Response (CADR) offers multi-layer protection

Using Spring4Shell as an example, discover how Dynatrace can detect and prevent exploitation on multiple layers.

Read now

Mastering sign-in log monitoring: How to secure user identity with Dynatrace

Cyberattacks are increasingly shifting user identities. Discover show sign-in monitoring is crucial to secure user identity.

Read now

Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior

By combining different data sources like logs and runtime context, Dynatrace can help improve detection accuracy and create actionable findings.

Read now

Kubernetes security essentials: Kubernetes misconfiguration attack paths and mitigation strategies

A Kubernetes misconfiguration can lead to security vulnerabilities. Learn how attackers exploit them, and how to mitigate attacks.

Read now

Kubernetes security essentials: Understanding Kubernetes security misconfigurations

All too often, Kubernetes misconfigurations become security misconfigurations. Learn why, and how to avoid them.

Read now