Introducing intelligent vulnerability remediation, powered by Sysdig Sage™  LEARN MORE Customers rate Sysdig top CNAPP in Customers' Choice category within Gartner® VOC report  LEARN MORE
Sysdig logo Sysdig Home
Sysdig logo
  • Platform
    • Back
    • Platform
    • Platform
      • Sysdig Secure
        CNAPP powered by runtime insights
      • Environments
      • Integrations
      • Sysdig Monitor
    • Powered By
      • Falco
        The core engine providing runtime insights to the Sysdig platform
    • hidden header
      • Sysdig Sage™ GenAI
        AI cloud security analyst with multi-step reasoning
    • SysDig 555 logo555 Benchmark
      Detect and respond to cloud attacks faster than attackers can complete them
  • Solutions
    • Back
    • Solutions
    • Real-time Cloud Security
      • Cloud-Native Application Protection Platform
        Unified cloud security to protect your cloud, containers, and workloads
      • AI Workload Security
        Detect, prioritize, and remediate active AI risk
      • Cloud Detection & Response
        Detect, investigate, and respond to threats at cloud speed
    • From Prevention to Detection & Response
      • Cloud Workload Protection
      • Vulnerability Management
      • checklist icon
        Cloud Security Posture Management
      • Cloud Identity & Entitlement Management
    • hidden
      • Container & Kubernetes Security
      • Server Threat Detection & Response
      • Infrastructure as Code Security
    • Falco logoCloud Security Requires Runtime Insights
      Real-time visibility for detection and response and rich context to prioritize what matters most
  • Company
    • Back
    • Company
    • Why Sysdig
      • Our Customers
        Hear how our customers secure and accelerate innovation in the cloud
      • Runtime Insights
        Learn how runtime insights powers real-time cloud security
      • Threat Research Team
        Get the latest threat research and security findings
    • About Sysdig
      • Who We Are
      • Leadership Team
      • Newsroom
    • Compare Sysdig
      • Aqua
      • Crowdstrike
      • Lacework
      • Orca
      • Prisma Cloud
      • SentinelOne
      • Wiz
    • Headshot of Dan Holden, VP of Cybersecurity at BigCommerceCustomer Spotlight
      BigCommerce achieves real-time cloud security
  • Open Source
    • Back
    • Open Source
    • OSS
      • Sysdig & OSS
        The future of security is open
    • Projects
      • Falco
        Detect threats in real time
      • Falco Feeds by Sysdig
        Enterprise detection rules for Falco users
      • Stratoshark
        Analyze, troubleshoot, and secure cloud environments
    • hidden
      • Open Policy Agent
        Unify policy enforcement for cloud-native environments
      • Prometheus
        Monitor cloud-native applications and Kubernetes
    • Headshot of Loris Degioanni - CTO and founder of SysdigWhy Open Source Matters
      Falco’s journey to CNCF graduation
  • Resources
    • Back
    • Resources
    • Learn
      • Blog
        Get the latest news and insights from cloud security experts
      • Learn Cloud Native
        Learn cloud and container security fundamentals
      • Content Library
        Explore cloud and container security content
    • Engage
      • Webinars & Workshops
      • Events
      • Contact Us
    • Get Support
      • Contact Support
      • Sysdig Status
      • Docs
    • Sysdig Threat Research thumbnailSysdig Threat Research
      Security research focused on the latest cloud-native security threats, vulnerabilities, and attack patterns
  • Search
    • Back
    • Best Match
      View all search results
  • Languages
    • Back
    • Language
    • Language Header – Hidden
      • Deutsch
      • English
      • Español
      • Français
      • Italiano
      • 日本語
  • Log In
    • Back
    • Log In
    • Monitor
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Secure
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Log In – 3rd Column Header – HIdden
      • Support
  • Get Demo
  • SysDig 555 logo555 Benchmark
    Detect and respond to cloud attacks faster than attackers can complete them
  1. Blog
  2. Mateo Burillo

Mateo Burillo

Monitoring, Open Source

Kubernetes monitoring with Prometheus, the ultimate guide

Kubernetes network policies with Sysdig

Blogs by Mateo Burillo

Filter By:
OpenShift Sysdig AWS

How to deploy OpenShift on AWS

Mateo Burillo | January 25th, 2018
Prometheus alerts to Sysdig Monitor

Integrating Prometheus alerts and events with Sysdig Monitor

Mateo Burillo | December 13th, 2017
Kubernetes Security

Kubernetes Security: How to harden internal kube-system services

Mateo Burillo | November 27th, 2017
Sysdig Secure

Sysdig Secure, Docker native run-time security

Mateo Burillo | November 13th, 2017
Kubernetes scheduler

How to write a custom Kubernetes scheduler using your monitoring metrics

Mateo Burillo | November 3rd, 2017
Sysdig Monitor

Sysdig Monitor fall 2017 release

Mateo Burillo | October 31st, 2017
docker security 7 threats

7 Docker security vulnerabilities and threats

Mateo Burillo | August 25th, 2017
featured image

How to monitor Nginx on Kubernetes: Metrics alerts

Mateo Burillo | June 8th, 2017
post logo

How to monitor Nginx on Kubernetes

Mateo Burillo | May 24th, 2017
linkerd logo

How to monitor Linkerd the microservices proxy

Mateo Burillo | May 10th, 2017
Back to Blog
  • Products
    • Sysdig Secure
    • Sysdig Monitor
  • Partners
    • Sysdig Partners
    • Partner Signup
    • Partner Locator
    • Integrations
    • Partner Portal
  • Company
    • About Us
    • Leadership
    • Careers
    • Newsroom
    • Contact Us
    • Legal
    • Sitemap
  • Support
    • Support
    • Sysdig Status
    • Documentation
    • Customer Success
  • Social
    • X (Formerly Twitter) logoTwitter
    • Github logoGithub
    • Slack logoSlack
    • YouTube logoYoutube
    • LinkedIn logoLinkedIn

Sysdig logo
  • ® Copyright 2025 Sysdig, Inc.
  • Privacy Policy
  • Privacy Choices
  • Subprocessors
  • Trust Center
  • Change Consent