Sysdig Site Search
How to monitor etcd
Etcd is the backend store for all the Kubernetes cluster related data. It is undoubtedly a key component in the...
Kubernetes ErrImagePull and ImagePullBackOff in detail
Pod statuses like ImagePullBackOff or ErrImagePull are common when working with containers. ErrImagePull is an error happening when the image...
Unveil hidden malicious processes with Falco in cloud-native environments
Detecting malicious processes is already complicated in cloud-native environments, as without the proper tools they are black boxes. It becomes...
Enable Kubernetes Pod Security Policy with kube-psp-advisor.
Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain...
LLMjacking targets DeepSeek
The frequency and popularity of LLMjacking attacks are increasing. Given that trend, it isn't surprising that DeepSeek is being targeted days of its media virality and spike in usage.
What is multi-step reasoning?
Multi-step reasoning is a concept that is taught in grade school math class, but it applies far beyond mathematical calculations...
Prometheus 2.36 – What’s new?
In this article, we will analyze some new features and the impact they might have on the Prometheus community. Here’s...
Tales from the Crypt o’ mine – Four spooky short stories
Halloween is around the corner! 🎃 Imagine that you’re with your cloud-native friends, sitting around the fireplace, having some s’mores,...
Trigger a Kubernetes HPA with Prometheus metrics
In this article, you’ll learn how to configure Keda to deploy a Kubernetes HPA that uses Prometheus metrics. The Kubernetes...
CVE-2025-32955: Security mechanism bypass in Harden-Runner Github Action
The Sysdig Threat Research Team (TRT) has discovered CVE-2025-32955, a now-patched vulnerability in Harden-Runner, one of the most popular GitHub...