What’s new in Sysdig – December 2021

By Diego Gagliardo - DECEMBER 20, 2021


What's new Sysdig December

Here we are with the final “What’s new in Sysdig” monthly newsletter of the year. First of all, Merry Christmas, メリークリスマス, Buon Natale, 성탄을 축하드려요, С рождеством!, Vrolijk kerstfeest, Feliz Navidad!

Whatever you may be celebrating, we wish you a wonderful holiday season from all of us at Sysdig!

First, we want to acknowledge the recent celebration (Dec. 18th) of International Migrants Day, to raise awareness about the protection of migrants and refugees. Our hearts are with them.

As a member of the team in charge of “What’s new in Sysdig,” this month is up to me, Diego Gagliardo. I joined Sysdig in Aug. 2020, as a Technical Account Manager based in Milan, Italy. As an Open Source lover and Cybersecurity enthusiast, I spend my night time looking into the dark sky, searching for wonderful deep sky objects for my astrophotographs.

The highlight of the month at Sysdig is our recent funding round: amaze yourselves with the story and the news here.

Product wise, we’re happy to announce the release of Sysdig Secure for Cloud – Azure (more details below).

But for our customers, there’s no doubt that this month will go down in history for log4j and the (in)famous CVE-2021-44228 vulnerability.

Here is the Sysdig official statement:

The Sysdig agent does not include the log4j library

Sysdig is using an alternative framework for logging, called Logback. The logback framework isn’t vulnerable to this issue.

Sysdig components include a log4j library in our standard distribution that was vulnerable. This library is included for compatibility reasons only, it’s not used for primary logging, and our security team has determined we are not vulnerable based on our application architecture and existing mitigating controls.

Sysdig can confirm that all services that compose Sysdig’s Cloud Platform running Apache’s vulnerable log4j library have been patched to the latest version, or add additional mitigating controls suggested by vendors. We have not detected any successful attempts at exploitation of this attack vector during that time window.

Details regarding upgrades follow:

• explicitly set commonsLog4jVersion = 2.17.0

• update all of log4j-to-slf4j, log4j-api, and log4j-core to version 2.17.0

Enjoy some of our latest blog posts for a better understanding of this vulnerability and how to protect your environment (with Sysdig, of course)!

As always, please go check out our own Release Notes for more details on product updates, and ping your local Sysdig contact if you have questions about anything covered here.

Sysdig Secure

Sysdig Secure for Azure

Sysdig is pleased to announce the general availability of the Sysdig Secure for cloud capabilities for Azure.

  • Cloud Security Posture Management (CSPM): Based on CIS benchmarks tailored for your assets.
  • Cloud Threat Detection: Identify threats in your Azure environment using Falco rules for Azure.
  • Event Hub: Fully managed, real-time data ingestion service that’s simple, trusted, and scalable.
  • Image Vulnerability Scanning: Automatic vulnerability scanning of images pushed to Azure Container Registry and images executed on Azure Container Instance Group.

For details, see Deploy Sysdig Secure for cloud on Azure.

Sysdig Agents

The latest Sysdig Agent release is v12.1.1. Below is a diff of updates since v12.0.4, which we covered in our last update.

  • Ability to Build eBPF Probes for Debian 11 and for Linux Kernel v5.10.
  • Prebuilt Probes for Debian 11 and Fedora Kernels.
  • Enhanced Agent Containers for Probes on New Kernels with glibc v2.33.
  • File Metrics in Audit Tap.
  • Promscrape Memory Usage Limit: You can now limit the promscrape memory usage. The default is set to 640 MB.
  • Falco Action Works as Expected: The kill container Falco action works as expected for containerd in Azure.
  • Image Profile Shows Results Correctly: The imageid is reported correctly when using a CRI engine.
  • Kubernetes Daemonset and Replicaset Association Works as Expected: Fixed an issue that could invalidate the association between Kubernetes Daemonset and Replicaset.
  • Agent Updates Prometheus Configurations Correctly: Fixed a problem that was causing Prometheus configurations to be merged incorrectly when certain integrations were updated from the backend.
  • Duplicate Environment Variable Hashes No Longer Appear in Audit Tap: The discrepancy between reported environment variables and hash in audit tap has been fixed.

SDK, CLI and Tools

Sysdig CLI

v0.7.14 is still the latest release. The instructions on how to use the tool and the release notes from previous versions are available at the following links.


Python SDK

v0.16.3 is still the latest release, which we covered in our October update.


Terraform Provider

v0.5.27 is still the latest release, which we covered in our last update.


Falco VS Code Extension

v0.1.0 is still the latest release.


Sysdig Cloud Connector

v0.13.0 of the Sysdig Cloud Connector was released. We covered v0.11.3 last month.

Here are some highlights of the diff between these versions:

New Features

  • Added azure scanning capabilities
  • k8s: Allow to use custom tags in K8s Audit Log events
  • Allow to disable tracking using an env variable
  • Enabled AWS Brute Force attack
  • Allow user to configure buffer size for ingestors

Bug Fixes

  • Fixed scanning keys in cloud-connector.yaml configuration
  • Rule Run Instances with Non-standard Image not comparing correct field
  • Added service to AWS scanning rules

Check the full list of changes to get the full details.

Inline Scanner

v2.4.7 is still the latest release, which we covered in our last update.

Sysdig Secure Inline Scan for Github Actions

v3.2.0 is still the latest release, which we covered in our last update.


Sysdig Secure Jenkins Plugin

v2.1.12 is still the latest release.


Prometheus Integrations


New Dashboards and Alerts

  • Kubernetes Storage and PCV dashboard and alerts
  • Troubleshooting panels in workload dashboard
  • Kubernetes alerts for containers and pods troubleshooting (Crash Loop Back Off, OOMkill, etc.)
  • Kubernetes alerts for disappearing nodes or clusters

Bug Fixes

  • Bug fixed in Pod_Rightsizing_&_Capacity_Optimization Dashboard

Training & Education

We announce the availability of the all new Falco 101 Training Course, a must-attend training for those interested in container runtime security that wants to better understand Falco, its rules syntax, alerting, configuration, and more.

Falco 101

New Website Resources



Subscribe and get the latest updates