Announcing Sysdig 0.1.85

By on July 9, 2014
This is mainly a bugfix release, targeting two rare but critical bugs that could cause a kernel panic when dealing with certain system call arguments.

The main new feature is sysdig completion for bash and zsh.

What this means is that from now on you don’t have to look at the manual constantly when using sysdig, and you can just press the TAB key any time you’re struggling remembering the syntax, and the possible alternatives will come up, like in this bash example:

gianluca@sid:~$ sysdig --list[Tab]
--list  --list-chisels  --list-events

Or, even cooler, with zsh you can see a whole bunch of “dynamic” things:

gianluca@sid~% sysdig -c[Tab]
bottlenecks         -- Slowest system calls
echo_fds            -- Print the data read and written by processes.
fdbytes_by          -- I/O bytes, aggregated by an arbitrary filter field
fdcount_by          -- FD count, aggregated by an arbitrary filter field
fileslower          -- Trace slow file I/O
iobytes             -- Sum of I/O bytes on any type of FD
iobytes_file        -- Sum of file I/O bytes
iobytes_net         -- Show total network I/O bytes
list_login_shells   -- List the login shell IDs
netlower            -- Trace slow network I/0
proc_exec_time      -- Show process execution time

As you can see, the support for zsh is much nicer than the bash one, it automatically completes chisels and filter fields! We gladly welcome patches from the community to bring the bash completion at the same level!

In order to use this, if you install sysdig through our binary repository, the completion files are already installed under /usr/share/zsh/vendor-completions/_sysdig and /etc/bash_completion.d/sysdig, so the majority of the distributions will automatically use them by default. If you install sysdig from sources, “make install” will put them in /usr/local/share/zsh/vendor-completions/_sysdig and /usr/local/etc/bash_completion.d/sysdig, so you might have to tweak a bit your shell to get access to it, as usual.


Release details

Update instructions

Installation instructions

Source code


Community support is available on the sysdig mailing list.

Bugs and issues can be submitted through github.

Eager to learn more? Check out our online session: Building an Open Source Container Security Stack

On this session Sysdig and Anchore are presenting how using Falco and Anchore Engine you can build a complete open source container security stack for Docker and Kubernetes.

This online session will live demo:

  • Using Falco, NATS and Kubeless to build a Kubernetes response engine and implement real-time attack remediation with security playbooks using FaaS.
  • How Anchore Engine can detect software vulnerabilities in your images, and how can be integrated with Jenkins, Kubernetes and Falco.

Stay up to date!

Get new articles from this blog (weekly)
Or container ecosystem updates (monthly)

Thanks so much for signing up!
Please check your inbox for a confirmation email.