Sysdig Site Search
Kubernetes 1.21 – What’s new?
Kubernetes 1.21 is about to be released, and it comes packed with novelties! Where do we begin? This release brings...
How to detect sudo’s CVE-2021-3156 using Falco
A recent privilege escalation heap overflow vulnerability (CVSS 7.8), CVE-2021-3156, has been found in sudo. sudo is a powerful utility...
Container security on IBM Cloud
If you’re running containers and Kubernetes on IBM Cloud, you can enable the key security workflows of Sysdig for your...
Closing the cloud security gap with runtime security
Imagine your cloud environment as a commercial plane. Before flight, planes undergo strict maintenance schedules, tests, and preflight checks to...
Cut Custom Metrics Cost by 75% and Observe More
Modern applications are increasingly being instrumented with “Custom Metrics” to monitor both their health and the impact on business.
Kubernetes security context, security policy, and network policy – Kubernetes security guide (part 2).
Once you have defined Kubernetes RBAC: users and services credentials and permissions, we can start leveraging Kubernetes orchestration capabilities to...
Kubernetes Services: ClusterIP, Nodeport and LoadBalancer
Pods are ephemeral. And they are meant to be. They can be seamlessly destroyed and replaced if using a Deployment....
Four features of containers that help (and hurt) Docker security
Although most companies make the switch to containers for reasons other than security, eventually they will wonder about exactly how...
Improving the Prometheus exporter for Amazon CloudWatch
A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a...
Challenges using Prometheus at scale
This article will cover the most common challenges you might find when trying to use Prometheus at scale. Prometheus is...