Sysdig Site Search
Practical Guide for DFIR Kubernetes
Containerization has gone mainstream, and Kubernetes won out as the orchestration leader. Building and operating applications this way provides massive...
Monitoring Kubernetes (part 3): Kubernetes troubleshooting service discovery
This article is part of our series on operating Kubernetes in production. Part 1 covered the basics of Kubernetes and...
Getting started with Kubernetes audit logs and Falco
As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security...
Kubernetes security for Google Cloud Security Command Center.
Effective Kubernetes security hinges on security response teams being able to quickly detect and respond to security threats on live...
Kubernetes Security Logging with Falco & Fluentd.
Kubernetes security logging primarily focuses on orchestrator events. The Kubernetes documentation provides a good starting point for auditing events of...
How to Monitor Kubernetes Control Plane with Sysdig
As we already discussed in previous articles, the Kubernetes control plane is made up of a few key components playing...
What’s new in Kubernetes 1.14?
As it is already a tradition, here we are with What’s new for Kubernetes 1.14. Here at Sysdig we follow...
Understanding how Kubernetes DNS services work
Kubernetes allows you to create container groups and define services on top of them. Kubernetes assigns each service a virtual...
WordPress in Kubernetes: The Perfect Setup
This tutorial shows how to prepare and deploy WordPress with all required dependencies (MySQL, etc) in Kubernetes. Why WordPress? WordPress...
Enable Kubernetes Pod Security Policy with kube-psp-advisor.
Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain...