Search Results

Search Results 191 - 200 of 654

Whitepaper

Five Keys For Scaling Prometheus

Prometheus has become the de-facto standard for DevOps and SRE teams to monitor Kubernetes workloads. Download this guide to learn the options and best practices for scaling Prometheus as the scope of your production Kubernetes deployment increases.

On-Demand Webinar

Kubernetes Security Master Class: Detecting anomalous activity in Rancher with Falco

Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility.

Blog

Falco Support on AWS Fargate

Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also…

On-Demand Webinar

Owning Secure DevOps for Google’s Anthos & GKE

As cloud-native becomes the standard for application deployment, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability. Join us to hear how this is being addressed by customers across the Kubernetes lifecycle. We’ll also demo best practices for vulnerability management, runtime security, and container forensics with Google’s Anthos and GKE.

Blog

OpenMetrics: Is Prometheus unbound?

This article will introduce OpenMetrics, compare it to the Prometheus exposition format and review the current status of its implementation….

On-Demand Webinar

Automating Security for DevOps Workflows

Your developers need to be productive as you ramp containers and Kubernetes in production — without security being a blocker. With several software updates a day in a cloud-native environment, legacy tools can’t keep up. Running reliable and secure containers requires that security and DevOps work better together. We’ve got some great tips to share about automating and integrating security and compliance into the DevOps workflow, so your cloud applications ship faster.

On-Demand Webinar

K8s Limits and Requests: Monitoring and Troubleshooting by example

Are your Kubernetes applications not performing well enough? Is your infrastructure oversized? Kubernetes limits and requests dictate the resources available to your applications, so when they aren’t set correctly your cluster suffers from CPU throttling and Out Of Memory Kills. Oversizing your infrastructure is an easy, but expensive, solution — there must be a better way.