The Official Sysdig Blog

Monitoring Kubernetes (part 4): Docker + Kubernetes at WayBlazer – A use case

By on March 24, 2017

This article is part of our series on operating and monitoring Kubernetes in production. Part 1 covered the basics of Kubernetes and monitoring tools; Part 2 covered Kubernetes alerting best practices. Part…

Read More →

Monitoring Kubernetes (part 3): Kubernetes troubleshooting service discovery

By on March 24, 2017

This article is part of our series on operating Kubernetes in production. Part 1 covered the basics of Kubernetes and monitoring tools; Part 2 covered Kubernetes alerting best practices. This part will…

Read More →

Monitoring Kubernetes (part 2): Best practices for alerting on Kubernetes

By on March 23, 2017

A step by step cookbook on how to configure alerting in your Kubernetes cluster with a focus on the infrastructure layer. This article is part of our series on operating Kubernetes in…

Read More →

Monitoring Kubernetes (part 1)

By on March 21, 2017

Our in depth, 5-part series explores Kubernetes principles, key metrics, alerts, and troubleshooting.

Read More →

Sysdig Monitor is the new Sysdig Cloud

By on March 20, 2017

I’m excited to let you know that Sysdig Cloud has officially been renamed to Sysdig Monitor! Naming products (or companies or features for that matter) is a funny thing. You try really…

Read More →

How to detect SSH attempts by Chuck Norris

By on March 15, 2017

It’s fun to read about new tools on HackerNews, but I’ve always enjoyed getting my hands dirty and trying something new myself. That’s why we’re kicking off this series to give users…

Read More →

Monitoring Java in Docker at CDK

By on March 7, 2017

Summary The Digital Marketing business unit of CDK global shifted to a containerized approach for their next generation infrastructure. One of the challenges they ran into was how to monitor java applications…

Read More →

Four features of containers that help (and hurt) Docker security

By on March 5, 2017

Although most companies make the switch to containers for reasons other than security, eventually they will wonder about exactly how security will fit in and whether their existing security mechanisms will translate…

Read More →

How to monitor Ceph: the top 5 metrics to watch

By on January 30, 2017

Now that we’re up and running, we need to talk about how to monitor Ceph. Monitoring and troubleshooting your Ceph storage infrastructure is as important – and arguably more important – as monitoring the containers that your apps run in.

Read More →

Ceph persistent volume for Kubernetes or Openshift

By on January 30, 2017

State aware applications like databases or file repositories need access to the same file system no matter where the container they are running on is scheduled. Kubernetes and Openshift call this persistent volume.

Read More →