Sysdig Site Search
Securing AWS IAM with Sysdig Secure
Last year’s IDC’s Cloud Security Survey found that nearly 80 percent of companies polled have suffered at least one cloud...
No pain… More gain! Sysdig Monitor radically simplifies monitoring integrations based on open source
Monitoring services and applications in just a few clicks – that’s the dream of every SRE and developer, but this...
How to monitor Docker Swarm
In the following tutorial I will show how to monitor Docker Swarm using Sysdig Monitor. Docker Swarm is the Docker...
How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability
The CVE-2021-33909, named Sequoia, is a new privilege escalation vulnerability that affects Linux’s file system. It was disclosed in July,...
Deploying Sysdig from the new AWS CloudFormation Public Registry
AWS CloudFormation provides an easy way to model and set up AWS resources to help you save time in deploying...
Automated Falco rule tuning
We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On...
See your logs and metrics together with LogDNA and Sysdig integration
Observability is the key to solving problems quickly, and organizations use many tools to try to increase visibility in their...
Securing AWS Fargate workloads: Meeting File Integrity Monitoring (FIM) requirements
Securing AWS Fargate serverless workloads can be tricky as AWS does not provide much detail about the internal workings. After...
How to monitor Microsoft SQL Server with Prometheus
In this article, you will learn how to monitor SQL Server with Prometheus. SQL Server is a popular database, which...
How to detect EC2 Serial Console enabled
Recently, Amazon AWS introduced the new feature EC2 Serial Console for instances using Nitro System. It provides a simple and...