Sysdig Site Search
Cloud Security for Google Cloud
This guide outlines key requirements and capabilities for establishing comprehensive security for Google Cloud services and containers.
5 best practices for securing AWS cloud and containers
Learn how to automate efficient security and compliance controls in Amazon Web Services (AWS). Secure and accelerate your cloud innovation on AWS with five best practices for cloud and container security.
PromQL Cheatsheet
Prometheus is a monitoring and alerting system with a text based metric format, a multidimensional data model and a powerful query language. It’s now widely used and is the de facto standard for monitoring kubernetes. Metrics can be pulled from different sources, known as 'targets'. Download the PromQL Cheatsheet to see examples of popular functions and selectors.
Secure DevOps Practices at Yahoo Japan
With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.
Prometheus Monitoring Guide
Prometheus is fast becoming one of the most popular Docker and Kubernetes monitoring tools to use. Learn about the benefits of Prometheus, and how to use it for monitoring Kubernetes services, clusters and components.
Getting started with secure DevOps
As you move to the cloud, your focus is on developing and deploying your applications. You may leave some functions for later, thinking they will slow you do...
Securing Kubernetes in Production. Are You Ready?
As Kubernetes scales up, security is the #1 challenge facing DevOps. Learn why organizations are moving to a secure DevOps workflow and how you can start your journey. Click to learn more.
Need to Extend Prometheus Monitoring?
Dynamic, container-based environments can be a challenge for monitoring cloud-native applications. While Prometheus is gaining rapid developer adoption as the open-source monitoring standard, scaling beyond a few clusters can be challenging. Click to learn more.
Kubernetes Monitoring Guide
This guide will help you navigate the complexities of monitoring Kubernetes workloads and show you detailed steps you can take to make sure you have the visibility you need to be successful!
Kubernetes Security Guide
One of the key points of cloud-native security is addressing container security risks as soon as possible. Doing it later in the development life cycle slows down the pace of cloud adoption, while raising security and compliance risks. We’ve compiled this security guide to provide guidance on choosing your approach to security as you ramp up the use of containers and Kubernetes.