Sysdig Site Search
Announcing Sysdig Secure 2.3: NIST + PCI image compliance checks, Kubernetes and Docker remediation tips, and more!
Today we are very excited to announce our latest release — Sysdig Secure 2.3! In this version of Sysdig Secure,...
Fishing for Miners – Cryptojacking Honeypots in Kubernetes
Introduction A while back, we wrote a blog post about opening an EC2 instance to the world to see who...
Sysdig’s Prometheus monitoring behind the scenes
A few weeks ago, we announced that Sysdig is offering fully compatible Prometheus monitoring at scale for our customers, as...
New views for monitoring microservices in Sysdig Cloud
This new feature release continues our drive towards simpler monitoring of microservices versus monitoring servers, or even monitoring docker containers...
How to monitor Istio, the Kubernetes service mesh
Istio service mesh allows you to add key capabilities like observability, security, and traffic management to your applications without having...
How to monitor OpenShift with Sysdig Monitor
Monitoring Red Hat OpenShift brings up challenges compared to a vanilla Kubernetes distribution. Discover how Sysdig Monitor, and its exclusive...
Preventing cloud and container vulnerabilities
Vulnerabilities are software bugs or weaknesses that could be used by an attacker. They could be present in the operating...
How a financial leader used the power of the Sysdig platform
In the cloud, security is a true balancing act. We have written about the challenge of making both on-prem and...
Troubleshooting Application Issues with Extended Labels
Troubleshooting issues in Kubernetes can be tough. When diagnosing these problems, you can find yourself with tons of microservices to...
Adapting security to Amazon EKS Anywhere on Bare Metal
Learn how Sysdig brings security, visibility, and compliance capabilities for containers and cloud to EKS-A Bare Metal. View the key use cases and see how you can use Sysdig Secure and Sysdig Monitor to protect and observe your workloads and infrastructure.