Sysdig Site Search
Detect CVE-2020-8554 – Unpatched Man-In-The-Middle (MITM) Attack in Kubernetes
The Kubernetes API server, in all versions of Kubernetes, unfortunately allows an attacker, who is able to create a ClusterIP...
How to detect Kubernetes vulnerability CVE-2019-11246 using Falco
A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could...
Kubernetes Monitoring Checklist
You are adopting a DevOps approach, using Kubernetes and containers to accelerate innovation. Kubernetes and container monitoring is critical to managing application performance, service uptime and troubleshooting. Click to learn more.
Sysdig Advisor: Making Kubernetes troubleshooting effortless
The cloud, Kubernetes, CI/CD, DevOps, GitOps… the last five years have seen a huge transformation in how organizations are architecting...
Introducing Sysdig Secure 2.2: Kubernetes auditing, compliance, and access control.
Over the past four years we’ve helped hundreds of organizations run reliable, secure, and compliant Kubernetes and Openshift clusters. Some...
Cloud Monitoring
How to detect the CVE-2020-8554 vulnerability that allows users to intercept traffic from other pods or nodes in a Kubernetes cluster.
6 Considerations for Kubernetes Capacity Planning
Proper resource planning and capacity optimization will allow you to operate Kubernetes with predictability and will improve system resilience. To do this, you will need deep visualize and correlation of all the metrics in your Kubernetes environment.
Troubleshooting Kubernetes: How container metadata changes your point of view
In this post we’ll discuss metadata in Kubernetes – and how it provides a new lens through which to monitor...
2018 Docker usage report
Our 2nd annual Docker Usage Report provides insight into real-world customer container deployments over the past year. Read about increasing densities, diversity in container runtimes, and details on what's happening with orchestrators like Kubernetes.
Guide to OWASP Top 10 for Kubernetes
This guide on OWASP Top 10 for Kubernetes provides valuable information and best practices beyond the original OWASP guidance, and that applies broadly to most Kubernetes environments.