Sysdig

2013
San Francisco, CA, USA
Jan 23, 2020   |  By Carlos Arilla
Pod evicted and scheduling problems are side effects of Kubernetes limits and requests, usually caused by a lack of planning. Beginners tend to think limits are optional, and merely an obstacle for your stuff to run. Why should I set a limit if I can have no limits? I may need all CPU eventually. With this way of thinking Kubernetes wouldn’t have gone far. Fortunately, Kubernetes developers had this in mind, and the quota mechanism is designed to avoid misuse of resources.
Jan 22, 2020   |  By Sysdig
Investment fuels company's leadership as the most advanced Kubernetes security tool to embed security, maximize availability, and validate compliance
Jan 21, 2020   |  By Carlos Arilla
How we set Kubernetes limits and requests is essential in optimizing application and cluster performance. One of the challenges of every distributed system designed to share resources between applications, like Kubernetes, is, paradoxically, how to properly share the resources. Applications were typically designed to run standalone in a machine and use all of the resources at hand. It is said that good fences make good neighbors.
Jan 14, 2020   |  By lvaro Iradier
In this blog post, you will learn how to setup image scanning with Github Actions using Sysdig Secure DevOps Platform. We will create a basic workflow to perform a local scan to detect vulnerabilities and bad practices before the image is pushed to any registry. We will also customize scanning policies to stop the build according to a set of defined rules.
Jan 8, 2020   |  By Sysdig
Falco, originally created by Sysdig in 2016, is approved to join the CNCF Incubator after a 257 percent increase in downloads. The CNCF's only open source Kubernetes runtime security project has more than 8.5 million downloads as runtime security becomes cemented as a standard component of the cloud-native stack.
Feb 22, 2019   |  By Sysdig
Prometheus metrics add a valuable dimension to cloud-native monitoring giving developers visibility into applications in highly dynamic service-oriented architectures. Sysdig automatically collects Prometheus metrics and helps it scale for the enterprise.
Oct 3, 2018   |  By Sysdig
For Dummies Series - Best practices, insights and recommendations.
Oct 1, 2018   |  By Sysdig
Microservices built on containers and Kubernetes are helping you build and run software applications much faster than ever before. In your new infrastructure stack, keeping track of what’s happening becomes a new challenge.
Sep 1, 2018   |  By Sysdig
How to Monitor Kubernetes services, cluster and components.
Aug 1, 2018   |  By Sysdig
Scale, secure and augment Prometheus.
Dec 11, 2019   |  By Sysdig
Security is one of the biggest challenges in the day 2 operations journey for the cloud-native stack. New paradigms like containers, microservices and hybrid cloud workloads disrupt the way enterprises implement security processes.
Dec 11, 2019   |  By Sysdig
Chetan Mehinderatta, VP of Engineering at Goldman Sachs, discusses monitoring, troubleshooting, and securing containers in production.
Nov 13, 2019   |  By Sysdig
DevOps has transformed the way software is deployed, speeding innovation. However, implementing security is still a challenge for cloud teams. With the Sysdig Secure DevOps Platform you can confidently run cloud-native in production.
Nov 13, 2019   |  By Sysdig
Confidently run containers and Kubernetes in production with Sysdig.
Sep 19, 2019   |  By Sysdig
Lack of container visibility can create a security gap for dynamic microservices. Thankfully OpenShift security has boosted confidence in using containers. By pairing Sysdig Secure with OpenShift, you can take your cloud-native security to the next level.